US6073142A - Automated post office based rule analysis of e-mail messages and other data objects for controlled distribution in network environments - Google Patents

Automated post office based rule analysis of e-mail messages and other data objects for controlled distribution in network environments Download PDF

Info

Publication number
US6073142A
US6073142A US08/881,034 US88103497A US6073142A US 6073142 A US6073142 A US 6073142A US 88103497 A US88103497 A US 88103497A US 6073142 A US6073142 A US 6073142A
Authority
US
United States
Prior art keywords
mail message
message
post office
rule
action
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US08/881,034
Inventor
Fred J. Geiger
William K. Wood
Sonjaya T. Tandon
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tumbleweed Holdings LLC
Original Assignee
Park City Group Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
US case filed in Court of Appeals for the Federal Circuit litigation Critical https://portal.unifiedpatents.com/litigation/Court%20of%20Appeals%20for%20the%20Federal%20Circuit/case/2015-1771 Source: Court of Appeals for the Federal Circuit Jurisdiction: Court of Appeals for the Federal Circuit "Unified Patents Litigation Data" by Unified Patents is licensed under a Creative Commons Attribution 4.0 International License.
US case filed in Court of Appeals for the Federal Circuit litigation https://portal.unifiedpatents.com/litigation/Court%20of%20Appeals%20for%20the%20Federal%20Circuit/case/2019-1122 Source: Court of Appeals for the Federal Circuit Jurisdiction: Court of Appeals for the Federal Circuit "Unified Patents Litigation Data" by Unified Patents is licensed under a Creative Commons Attribution 4.0 International License.
First worldwide family litigation filed litigation https://patents.darts-ip.com/?family=25377654&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=US6073142(A) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
US case filed in Court of Appeals for the Federal Circuit litigation https://portal.unifiedpatents.com/litigation/Court%20of%20Appeals%20for%20the%20Federal%20Circuit/case/2015-1678 Source: Court of Appeals for the Federal Circuit Jurisdiction: Court of Appeals for the Federal Circuit "Unified Patents Litigation Data" by Unified Patents is licensed under a Creative Commons Attribution 4.0 International License.
US case filed in Court of Appeals for the Federal Circuit litigation https://portal.unifiedpatents.com/litigation/Court%20of%20Appeals%20for%20the%20Federal%20Circuit/case/2015-1677 Source: Court of Appeals for the Federal Circuit Jurisdiction: Court of Appeals for the Federal Circuit "Unified Patents Litigation Data" by Unified Patents is licensed under a Creative Commons Attribution 4.0 International License.
US case filed in Delaware District Court litigation https://portal.unifiedpatents.com/litigation/Delaware%20District%20Court/case/1%3A10-cv-01067 Source: District Court Jurisdiction: Delaware District Court "Unified Patents Litigation Data" by Unified Patents is licensed under a Creative Commons Attribution 4.0 International License.
US case filed in Court of Appeals for the Federal Circuit litigation https://portal.unifiedpatents.com/litigation/Court%20of%20Appeals%20for%20the%20Federal%20Circuit/case/2015-1769 Source: Court of Appeals for the Federal Circuit Jurisdiction: Court of Appeals for the Federal Circuit "Unified Patents Litigation Data" by Unified Patents is licensed under a Creative Commons Attribution 4.0 International License.
US case filed in Court of Appeals for the Federal Circuit litigation https://portal.unifiedpatents.com/litigation/Court%20of%20Appeals%20for%20the%20Federal%20Circuit/case/2016-1909 Source: Court of Appeals for the Federal Circuit Jurisdiction: Court of Appeals for the Federal Circuit "Unified Patents Litigation Data" by Unified Patents is licensed under a Creative Commons Attribution 4.0 International License.
US case filed in Delaware District Court litigation https://portal.unifiedpatents.com/litigation/Delaware%20District%20Court/case/1%3A12-cv-01581 Source: District Court Jurisdiction: Delaware District Court "Unified Patents Litigation Data" by Unified Patents is licensed under a Creative Commons Attribution 4.0 International License.
US case filed in Court of Appeals for the Federal Circuit litigation https://portal.unifiedpatents.com/litigation/Court%20of%20Appeals%20for%20the%20Federal%20Circuit/case/2015-1770 Source: Court of Appeals for the Federal Circuit Jurisdiction: Court of Appeals for the Federal Circuit "Unified Patents Litigation Data" by Unified Patents is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Park City Group Inc filed Critical Park City Group Inc
Assigned to PARK CITY GROUP reassignment PARK CITY GROUP ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GEIGER, FRED J., TANDON, SONJAYA T., WOOD, WILLIAM K.
Priority to US08/881,034 priority Critical patent/US6073142A/en
Application granted granted Critical
Publication of US6073142A publication Critical patent/US6073142A/en
Assigned to PARK CITY GROUP, INC., EDWARD CLISSOLD reassignment PARK CITY GROUP, INC., EDWARD CLISSOLD RELEASE OF SECURITY AGREEMENT Assignors: TRIPLE NET INVESTMENTS, LTD AS SUCCESSOR TO WHALE INVESTMENTS, LTD.
Assigned to PAIT CAPITAL FACILITY LLC reassignment PAIT CAPITAL FACILITY LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PARK CITY GROUP, INC.
Assigned to PARK CITY GROUP, INC. reassignment PARK CITY GROUP, INC. RELEASE AND REASSIGNMENT Assignors: TRIPLE NET INVESTMENTS, LTD.
Assigned to PARK CITY GROUP, INC. reassignment PARK CITY GROUP, INC. CORRECTIVE ASSIGNMENT TO CORRECT THE NATURE OF CONVEYANCE AS RELEASE OF SECURITY PREVIOUSLY RECORDED ON REEL 016958 FRAME 0202. ASSIGNOR(S) HEREBY CONFIRMS THE NATURE OF CONVEYANCE SHOULD BE ASSIGNMENT OF SECURITY AGREEMENT. Assignors: TRIPLE NET INVESTMENTS, LTD.
Assigned to INTELLECTUAL VENTURES I LLC reassignment INTELLECTUAL VENTURES I LLC MERGER (SEE DOCUMENT FOR DETAILS). Assignors: PAIT CAPITAL FACILITY LLC
Assigned to WHALE INVESTMENTS, LTD. reassignment WHALE INVESTMENTS, LTD. SECURITY AGREEMENT Assignors: PARK CITY GROUP, INC.
Assigned to TRIPLE NET INVESTMENTS, LTD. reassignment TRIPLE NET INVESTMENTS, LTD. CORRECTIVE ASSIGNMENT TO CORRECT THE RMONEOUS RECORDATION OF ASSIGNMENT OF SECURITY AGREEMENT DOCUMENT PREVIOUSLY RECORDED ON REEL 025445, FRAME 0907 ASSIGNOR(S) HEREBY CONFIMS THE ASSIGNMENT OF SECURITY AGREEMENT. Assignors: WHALE INVESTMENTS, LTD.
Anticipated expiration legal-status Critical
Assigned to HANGER SOLUTIONS, LLC reassignment HANGER SOLUTIONS, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: INTELLECTUAL VENTURES ASSETS 161 LLC
Assigned to INTELLECTUAL VENTURES ASSETS 161 LLC reassignment INTELLECTUAL VENTURES ASSETS 161 LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: INTELLECTUAL VENTURES I LLC
Assigned to TUMBLEWEED HOLDINGS LLC reassignment TUMBLEWEED HOLDINGS LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HANGER SOLUTIONS, LLC
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/107Computer-aided management of electronic mailing [e-mailing]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/214Monitoring or handling of messages using selective forwarding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking

Definitions

  • the present invention relates generally to electronic messaging systems, and more particularly to electronic messaging systems that enable the application of business communication policies for controlling distribution of electronic messages and other data objects.
  • An organization may limit the types of documents employees can distribute at work, and in some cases, control which persons within an organization communicate with each other. For example, the organization may prohibit the distribution of memoranda to all employees in order to reduce photocopying costs; it may except this rule for individuals with specific corporate positions, such as the president or chairman. As another example, an organization may filter documents that are to be sent to specific persons or departments, or it may automatically copy (archive) documents distributed by certain persons or departments. Finally, organizations ordinarily have rules that prohibit distribution of certain types of documents, such as those containing disparaging, sexist, or profane materials. These various rules are typically documented as part of the organization's business communication policies, and managed by the personnel, human resources, or other departments.
  • an e-mail system comprises one or more post offices, zero or more mail servers and a relatively large number of e-mail client applications.
  • the post offices are distribution mechanisms which receive e-mail messages from client applications (both within the organization and external thereto) and transfer these e-mail messages to other post offices associated with the specified recipients, who again are both within and external to the organization or system.
  • Conventional post offices operate on a store and forward model, where an e-mail message is stored only temporarily for the duration it takes to route the message to the next post office(s).
  • post offices deliver incoming messages to a mail server which persistently stores the messages for the recipients.
  • the recipients access the messages via the client applications.
  • the post offices deliver e-mail messages directly to the client applications.
  • the e-mail client applications are end-user applications for creating, reading, and managing a user's individual e-mail account.
  • An organization should be able to define specific business rules which implement its business communication policies, and apply these business rules to all e-mail messages on the e-mail system in order to monitor and control the distribution and handling of e-mail messages.
  • e-mail systems do allow the individual user of the e-mail client application to define how e-mail messages received or sent by that specific e-mail client application are to be handled. For example, the user of an e-mail client application may decide to store e-mail messages received from particular senders in various mailbags or directories.
  • conventional e-mail systems do not enable the organization to define specific business communication policy based rules for the post office itself to use in order to control the delivery of e-mail messages. Since all e-mail messages are received and routed by a post office, it is desirable to provide such ability directly at the post office rather than at the individual client application, which would at best provide only limited, and inconsistent rule application.
  • routing rules for routing and addressing e-mail messages. These rules however, are merely physical, data, or transport layer protocol rules (layers 2, 3, 4 of the OSI model), and describe only the low level handling of the e-mail message. Control of the delivery of e-mail messages by the post office itself is at the application or session layer (layer 7, 6). Thus, existing low level filtering rules do not provide the desirable ability to define business rules which implement business communication policies for handling e-mail messages.
  • E-mail messages are but one type of data object which are communicated over networks.
  • organizations use their internal and external networks to distribute and route many other types of data objects, such as database records, forms, application programs, and so forth.
  • data objects such as database records, forms, application programs, and so forth.
  • a data server is an e-mail type post office that includes the ability to directly distribute any general form of data in addition to e-mail messages.
  • the present invention enables the data server to monitor e-mail messages and other data objects, and to selectively gate, delete, forward, copy, release, or return e-mail messages and other data objects by applying the business rules to the messages and data received at the post office for delivery to others. Gating messages re-route the e-mail message from its specified recipients to a gatekeeper at a gatekeeping post office.
  • the gated message is additionally reviewed (either manually or automatically) and further processed, which again may include any of the above actions.
  • a post office includes a receipt engine, a database of business rules, a rule engine, and a distribution engine.
  • the receipt engine provides support for conventional e-mail protocols, such as SMTP or POP, so as to be able to receive e-mail messages from both internal client e-mail applications, and external e-mail systems.
  • the database of business rules are used to implement business communication polices of the organization.
  • Each business rule describes a particular action to be applied to an e-mail message in response to either attributes of the e-mail message or performance data of the post office.
  • a business rule may specify actions such as deleting the e-mail message, gating the e-mail message for further review, copying the e-mail message, returning the e-mail message to its sender without delivering it, forwarding the e-mail message to a new recipient, or releasing an e-mail message to its specified recipients.
  • the attributes of an e-mail message which may trigger application of a business rule include, for example, the size of the e-mail message, the number of attachments, the size of individual or all attachments, the text of the message or its subject line, the inclusion of specific addresses or distribution lists, and other message-specific attributes.
  • a business rule to gate an e-mail for further review may be triggered for any e-mail message that is addressed to the president of the company.
  • a business rule that returns an e-mail message to its sender may be triggered when the e-mail message or its attachments exceed a certain size, or that are addressed to a particular distribution list, such as "All Employees.”
  • Business rules may also be used at the post office to direct incoming e-mails to particular employees for further handling. For example, a business rule may forward an e-mail message from outside of the company to a particular employee or user (e.g., Marketing Director) when the text of message matches specific keywords or other properties (e.g., text within the message matching product name keywords), even where the employee is not one of the originally specified recipients.
  • a business rule may forward an e-mail message from outside of the company to a particular employee or user (e.g., Marketing Director) when the text of message matches specific keywords or other properties (e.g., text within the message matching product name keywords), even where the employee is not one of the originally specified recipients.
  • a business rule may be triggered by conditions completely external to any particular e-mail message being handled, but rather in response to statistical performance factors for the post office. For example, a business rule to defer delivery of an e-mail message may be triggered when the average throughput of the post office exceeds a defined threshold.
  • the business rules may be responsive to any discrete factors that reflect the business communication policies of the organization.
  • the rule engine operates with the database to apply the business rules to each e-mail message, in order to determine a set of actions (one or more) to be applied to the e-mail message.
  • bypass roles that enable an e-mail message to be released (delivered) without further rule application by the rule engine.
  • Bypass roles are associated with specific corporate positions, rather than specific persons (or e-mail addresses).
  • the corporate position of President may be a bypass role, such that all e-mail messages from the President are released without further application of the business rules.
  • the rule engine provides for each e-mail message it processes a set of actions to the distribution engine.
  • the distribution engine is responsible for handling the e-mail message according to the set of actions. These actions may instruct the distribution engine to release the e-mail message, gate the e-mail message by delivering it to a specified gatekeeping post office, delete the e-mail message without delivering it, return the e-mail message to the sender, and so forth, as described above.
  • each action has a predefined priority level.
  • the distribution engine then reviews the set of actions and applies the action having the highest priority level. For example, assume that as the result of different business rules being applied by the rule engine, the set of actions includes both deleting the message and copying the message. Deleting an e-mail message may be defined as a higher priority action than copying the message. Accordingly, the distribution engine would delete the e-mail message, without copying it.
  • the present invention provides the ability to gate e-mail messages by altering the delivery of the e-mail message from its specified recipients to a gatekeeping post office, where they are stored for further review and handling.
  • These gated e-mail messages may be manually reviewed by a corporate administrator designated as a gatekeeper, and either released, returned to the sender, deleted, forwarded, or copied.
  • the gated e-mail messages may also be automatically processed by an independent set of business rules, and again various different actions may be applied. Because each gatekeeping post office may act independently, it may further gate the e-mail message to yet another gatekeeping post office. This enables distributed, network gatekeeping and review of the e-mail messages by any number of corporate officials designated as gatekeepers.
  • FIG. 1 is an illustration of a gatekeeping e-mail message system in accordance with the present invention.
  • FIG. 2 is an illustration of the software architecture of a rule enforcing post office.
  • FIG. 3 is an illustration of the software architecture of a gatekeeping post office.
  • FIGS. 4A and 4B are flow diagram of the overall process of gatekeeping e-mail messages.
  • FIG. 5 is a flow diagram of the process of defining business rules within the rule base.
  • FIG. 6 is an illustration of a user interface for selecting rule enforcing post office to use a checkpoint.
  • FIG. 7 is an illustration of a user interface for designating checkpoint bypass roles.
  • FIG. 8 is an illustration of a user interface for defining specific business rules.
  • FIG. 9 is an illustration of a code point model for storing business rules.
  • FIG. 10 is an illustration of the data flow within a rule enforcing post office.
  • FIG. 11 is an illustration of the data flow within a rule engine for processing a message using the rule base.
  • FIG. 12 is a flow diagram of the operation of the evaluator for evaluating an e-mail message with respect to the rule base.
  • FIG. 13 is a flow diagram of the operation of the distribution engine for handling e-mail messages based on the action list for each message.
  • FIG. 14 is an illustration of the structure of a wrapped message.
  • FIG. 15 is a flow diagram of a process for configuring a gatekeeping post office.
  • FIG. 16 is an illustration of a user interface for configuring a gatekeeping post office.
  • FIG. 17 is an illustration of user interface for assigning organizational roles to gatekeeper roles.
  • FIG. 18 is an illustration of the operation of the receipt engine of a gatekeeping post office.
  • FIG. 19 is an illustration of a user interface for accessing gated messages in a gatekeeper's inbox.
  • FIG. 20 is an illustration of a user interface for reviewing a gated message.
  • FIG. 21 is an illustration of a user interface for returning a gated message to its sender.
  • FIG. 22 is a flow diagram of the operation of the gatekeeping post office during automatic message processing.
  • An electronic communication system 100 operates on a conventional communications network 104, which may be a LAN, WAN, MAN, or the Internet.
  • Communicatively coupled to the network through conventional e-mail protocols, such as SMTP, POP3, and the like are one or more rule enforcing post offices 102 ("REPO 102") and one or more gatekeeping post offices 106 ("GPO 106").
  • REPO 102 rule enforcing post offices 102
  • GPO 106 gatekeeping post offices
  • a conventional post office 109 may be present to provide conventional mail transfer functionality for transferring e-mail messages to and from the REPOs 102, and GPOs 106.
  • conventional mail servers and conventional post office/mail server combinations may be present.
  • the e-mail client applications 110 are capable of generating and receiving e-mail messages in a conventional manner for individual users. Users may use the e-mail client applications 110 to address e-mail messages to other e-mail client applications 110 associated with any of the post offices 109, 102, 106.
  • the terms "e-mail message” and “message” are used interchangeably and are intended to have the same meaning.
  • a gatekeeper administration program 108 (“GKADMIN 108") is used by system administrators to configure the various REPOs 102 and GPOs 106 of the system.
  • a gatekeeper interface client 107 (“GKI 107") is used by individual gatekeepers to access and review gated messages.
  • a gatekeeper is a human administrator assigned a gatekeeper role and having responsibility for reviewing gated messages.
  • An organizational database 111 stores organizational information, including an organizational hierarchy of organizational roles and the individuals assigned to such roles. This information is used by the REPOs 102 and GPOs 106 to apply various rules to messages based on the role of the sender or recipient.
  • a conventional post office acts as a mail transfer agent, and provides only for mail transfer based on a temporary store and forward model.
  • a REPO 102 is a post office that, in addition to conventional functionality for transferring messages, enforces an organization's business communications policies by applying to each e-mail message received (either from local e-mail clients applications 110 or other remote post offices) business rules which define actions to be applied to an e-mail message according to various attributes of the message or the state of the REPO 102 itself.
  • a REPO 102 includes functional modules for receiving, processing, and distributing e-mail messages to and from e-mail client applications 110 and other post offices (including REPOs 102, GPOs 106, and conventional post offices 109). These functional modules are provided by a receipt engine 200, a rule engine 210, and a distribution engine 230, respectively. Supporting data storage includes a message index 240 and a message store 250. Also included are a routing engine 220 and routing tables 260.
  • the receipt engine 200 provides a standard communication protocol interface (e.g., SMTP, MHS) to other post offices in order to receive e-mail messages from such post offices, and from any e-mail client applications 110 directly associated with the REPO 102.
  • the receipt engine 200 temporarily indexes and stores received messages in the message index 240 and message store 250 during processing of the message.
  • the message store 250 generally provides for temporary storage of message objects for subsequent distribution by the distribution engine 230.
  • the message index 240 provides interfaces to the rule engine 210 and the distribution engine 230 to enable these modules to retrieve e-mail messages from the message store 250, to enable the rule engine 210 to access stored messages for processing prior to any distribution.
  • the routing engine 220 cooperates with the routing tables 260 in a conventional manner to determine, given recipient or addressee information of an incoming message, the proper post office and mail protocols for further delivery of the message.
  • the routing engine 220 provides the routing information to the distribution engine 230 when necessary to continue delivery of the message.
  • the rule engine 210 operates in conjunction with a rule base 270 to process incoming messages with business rules defined in the rule base 270.
  • the rule base 270 stores one or more sets of business rules.
  • Business rules are input into the rule base 270 using the GKADMIN 111.
  • "business rule” and “rule” are used interchangeably and are intended to have the same meaning.
  • Each set of business rules is referred to as a "checkpoint,” and a REPO 102 is alternatively known as a checkpoint post office.
  • Each business rule specifies an action to be applied to a message by the distribution engine 230.
  • the actions are output by the rule engine 210 in the form of an action list which is read and interpreted by the distribution engine 230.
  • the distribution engine 230 handles e-mail messages in accordance with actions specified for the messages in the action list.
  • the distribution engine 230 supports conventional mail protocols for delivering messages to other post offices, both conventional and servers such as the REPO 102 and GPO 106.
  • One of the significant actions of the distribution engine 230 is to "gate" an e-mail message by delivering it to one or more GPOs 106 instead of delivering it to any of the recipients specified by the sender. This gating action enables administrative review of the e-mail message by a gatekeeper administrator prior to any delivery.
  • a REPO 102 may also include a mail server component, so that client applications may communicate with the mail server to receive messages delivered to the REPO 102.
  • the REPO 102 receives a message for a specified recipient associated with the post office, it transfers the message to an inbox for the mail server, which in turn makes the message available to the appropriate mail client application.
  • a master table folder 280 is optionally provided that defines, typically for each user associated with the REPO 102, a collection of folders (also called "mailbags" herein) for indexing stored messages.
  • the message store 250 is used for persistent storage of messages, enabling them to be served to client applications by the mail server.
  • a GPO 106 is a post office that provides for administrative review and processing of gated messages.
  • a GPO 106 provides for both manual review by a gatekeeper--a person designated to review gated messages--and automatic review and processing using its own set of business rules. Processing applies various actions to gated messages, including deleting the message without delivering it to the specified recipients, returning a message to its sender, copying a message prior to sending, editing a message, forwarding the message to a new recipient, and releasing a message for distribution to its specified recipients.
  • a GPO 106 provides for both immediate execution of these processing actions or delayed execution.
  • the primary function of the GPO 106 operates contrary to the conventional unabated delivery model by adding an additional processing and review layer between the sending of the message and its receipt (if ever) by the originally specified recipients.
  • a GPO 106 may provide only gatekeeping functionality, as a post office which only receives gated messages, but otherwise is not used to rule process other messages as does a REPO 102.
  • a GPO 106 may also include the functionality of a REPO 102, and receive both gated messages and non-gated messages, and provide all of the rule processing functionality of a REPO 102 on such incoming non-gated messages. For the purposes of this disclosure, this integrated embodiment will be discussed first.
  • a GPO 106 Like a REPO 102, a GPO 106 includes a receipt engine 282, a rule engine 283, and a distribution engine 284. The GPO 106 extends the functionality of the receipt engine 282 and distribution engine 284 to handle messages which have been gated to the GPO 102, including providing functionality for automatically reviewing messages.
  • the receipt engine 282 operates in a manner similar to that described above to receive messages and to provide these messages to other components for indexing, storage, and processing. Because the GPO 106 receives gated messages from other post offices, the receipt engine 200 includes additional functionality for handling gated messages. This additional functionality includes distinguishing gated messages from non-gated messages as messages are being received, and providing gated messages to the inbox of a gatekeeper while providing non-gated messages to the receipt engine 282 for rule processing as described above. Further, the GPO 106 includes additional functionality, for example, as part of its program executive, to automatically review messages on a periodic basis and perform defined actions upon such messages.
  • the rule engine 210 operates in conjunction with a gatekeeping rule base 289, which stores a set of business rules for handling gated messages, and with a rule base 270 as described above for handling non-gated messages.
  • the rules for the gatekeeping rule base 289 may be different from the rules applied at one of the REPOs 102 in the rule base 270 of the GPO 106, and in particular can be specifically adapted by the administrator with the intent of handling gated messages received from a REPO 102 or other GPOs 106.
  • a GPO 106 provides a gatekeeping message index 287 and gatekeeping message store 288 which is used to store gated messages prior to review and processing.
  • the gatekeeping message index 287 and gatekeeping message store 288 are preferably separate from the message index 285 and message store 286 used for storing messages during normal rule processing and transfer. This is because during the gatekeeping phase storage is transient, typically for only as long as necessary to process the messages.
  • the gatekeeping message index 287 and gatekeeping message store 288 are used for persistent storage of gated messages until reviewed and processed, which may require storage for extended periods of time (e.g., 30 days).
  • FIG. 2 illustrates this embodiment with two distinct message indices and message stores.
  • a regular message index 285 indexes all regular (non-gated) messages received by the GPO 106, which are then stored in the regular message store 286. Gated messages however are indexed in a gatekeeping message index 287, and stored in the gatekeeping message store 288.
  • the GPO 106 distinguishes a gated message from a non-gated message by whether or not it is a wrapped message.
  • the master folder table 290 defines these folders and their parameters.
  • the master folder table 290 includes an inbox for each gatekeeper, into which gated messages for that gatekeeper are placed.
  • Useful folders which may be defined include a return folder, a delete folder, and a release folder; other folders may also be created as needed by a gatekeeper.
  • Each folder has a unique folder ID which is stored with the message in the message index 240 and a folder name.
  • each folder has two time parameters associated with it: a release date and a retain date.
  • the release date is the date on which all messages in the folder are released.
  • the retain date is the date up to which all messages in the folder are retained, and then deleted on the specified date.
  • a gatekeeper can create any number of folders to release or delete gated messages after various times. The earliest time parameter is always executed first.
  • each folder also has a time parameter, and an action associated with the folder.
  • a folder action is a gatekeeper-defined action to be applied to the messages in the folder according to the time parameter.
  • the actions include gating, forwarding, copying, deleting, or returning the messages.
  • complex action sequences may also be defined by a gatekeeper, such as copying and then deleting messages. This flexible definition of the folder actions enables a gatekeeper to precisely control the processing applied to gated messages.
  • the time parameters may be either:
  • a delta time This parameter specifies an amount of time after which a message in the folder is acted upon according to the folder action. The delta time is measured by the GPO 106 relative to a timestamp of the message.
  • a time interval a periodic time interval for acting upon messages in the folder. All messages in the folder are acted upon according to the folder action at the same time upon expiration of the interval.
  • Fixed time a specific date and/or time at which all messages in the folder are acted upon according to the folder action.
  • the inbox has a delta time parameter associated with it, while the other folders have a time interval parameter.
  • Each folder may also be associated with a gatekeeper role, which identifies the owner of the folder as the gatekeeper who created the folder. This allows the gatekeeper who created the folder to reset the time parameter and action.
  • An embodiment including two segregated message indices 285, 287 is desirable because it enables the rule engine 283 and the distribution engine 284 to very quickly distinguish gated messages which tend to have relatively long or persistent storage, from non-gated messages which are stored only on a temporary basis, without having to use processing time to filter the distinct types of messages from each other.
  • a gatekeeper accesses gated messages through the GKI 107.
  • the gatekeeper manually reviews a gated message in an inbox assigned to that gatekeeper, and either directly acts upon the message to release, return, delete, copy, or edit the message, or delays disposition of the message by moving the message with one of the other folders which will be automatically processed at a later time.
  • the GKI 107 also supports automatic processing of gated messages, as further explained below.
  • the REPOs 102 and the GPOs 106 are preferably implemented as software products executing on conventional server-class computers, such as Sun Microsystems Inc.'s SPARCTM based workstations and server, or IBM compatible computers based on Intel Inc.'s PentiumTM processors.
  • the servers operate in conjunction with conventional operating systems, such as UNIXTM, or Microsoft Corp.'s Windows95TM or WindowNTTM.
  • FIGS. 4A and 4B there is shown a flowgraph of the overall process of processing and gating e-mail messages in accordance with the present invention. Operation of an e-mail system in accordance with the present invention may be understood as having three distinct phases: rule definition, message processing, and gating.
  • an administrator or gatekeeper defines 402 various business rules for handling e-mail messages.
  • the rules are defined using the GKADMIN 108 which can directly edit the rule base of any GPO 106 or REPO 102.
  • the business rules are preferably consistent with the business communication policies used by the business, or may extend or modify such communication policies. These business rules are stored in the rule base 270 of one or more REPOs 102.
  • business rules for handling gated messages are created and stored in the gatekeeping rule base 289 of one or more GPOs 106.
  • bypass roles are an organizational position within the organization for which a message from a sender with a bypass role is passed through a REPO 102 without any other rule processing.
  • the president of the company would be a typical bypass role, and all messages from the president would then not be subject to the other rule processing or gating operations of a REPO 102.
  • bypass roles are used to define the exceptional case of unabated delivery in the context of the invention.
  • the bypass roles are defined with respect to company position, and not with respect to actual user names. This allows a change in the holder of the bypass role, without the administrator having to manually redefine the bypass role, as would be the case if the bypass ability were directly associated with a user name.
  • the role information for bypass roles is held in the organizational database 111.
  • the REPOs 102 and GPOs 106 are operational for receiving and distributing messages.
  • a message is received 404 at a REPO 102 from another post office or client application.
  • the receipt engine 200 indexes the message in the message index 240 and provides it to the rule engine 210.
  • the rule engine 210 checks 406 whether the sender has a bypass role. If so, the message is released 408 by the distribution engine 230.
  • the message may be delivered to the specified recipients at other post offices, or it may be gated at a REPO 102 that does not recognize the particular bypass role.
  • the rule engine 210 processes 410 the message with the business rules in the rule base 270 to determine the appropriate action(s) for handling the message. Typically, at least one business rule will be satisifed, and thereby specify the action to be applied to the message.
  • the action is communicated to the distribution engine 230, which applies 412 the action to the message. If there are multiple actions, the distribution engine 230 selects a highest priority action, and applies it to the message.
  • the distribution engine 230 may release 408, return 416, gate 418, copy 420, forward 421, or delete 422 the message. When a message is gated 418, it is not delivered to its initially specified recipients.
  • the gating action specifies a gatekeeper role at a GPO 106 who is to review the message. Accordingly, the distribution engine 230 sends the message to this gatekeeper.
  • a message is forwarded 421, it is delivered to a new recipient, typically one other than a specified recipient; the new recipient is specified by the applicable business rule which was satisfied.
  • a REPO 102 operates continuously in this mode of receiving and processing messages.
  • a GPO 106 which includes rule processing functionality on incoming messages also operates in this manner with respect to non-gated messages.
  • the gating phase is applied by a GPO 106 to messages that have been gated 418 by a REPO 102 or other GPO 106.
  • a gated message is received 424 at a GPO 106, indexed in the gatekeeping message index 287 and initially placed in an inbox for the gatekeeper to whom the message has been gated.
  • the present invention provides for two types of gatekeeping review, manual review and automatic review. Each of these types of reviews may result in actions that are immediately executed, or actions for which execution is delayed.
  • the gatekeeper evaluates 428 any or all of the messages in the inbox, and may immediately execute an action on the message, including releasing 430 the message, returning 432 the message to its sender (with or without an explanation as to why it was returned and not delivered), deleting 434 the message, copying 436 the message, and gating the message by forwarding 438 it to yet another gatekeeper, or otherwise forwarding 438 the message to another recipient for further handling.
  • the gatekeeper can edit 440 a message, for example to remove offensive language, delete an attachment, or the like. After editing, the gatekeeper can release 430 the message for further delivery (to the specified recipients or other recipients), or return 432 it to the sender with an explanation of why the message was not delivered.
  • the gatekeeper may decide to delay execution of an action such that it is applied to a set of messages instead of individually. For delayed execution, the gatekeeper moves 442 a message to a mailbag which has a defined time parameter.
  • the mailbag may have a specifically defined action, such as a release mailbag 444, a return mailbag 445, a delete mailbag 446, a forward mailbag 447, or a review mailbag 448, or it may simply have a release and retain date.
  • the GPO 106 periodically checks the time parameters of the various mailbags and executes 449 an appropriate action for each mailbag upon expiration of its time parameter. For example, a delete mailbag 446 may have an interval time parameter of 30 days; all messages in this mailbag are deleted once every 30 days.
  • a release mailbag 444 may have a specific release date, and the GPO 106 checks to see if the current date matches the release date, and if so, releases the messages in the mailbag. This approach lets a gatekeeper manually review some messages and immediately act on some messages, while delaying actions on other messages.
  • the gatekeeper may review the message and not perform any action on it at all, including not releasing the message. In this instance, the message simply remains in the gatekeeper's inbox.
  • Automatic review is also provided by the GPO 106, for example as part of its basic functionality or program executive.
  • the GPO 106 operates a daemon process, and periodically wakes up and processes all messages in the gatekeeper's inbox.
  • the inbox has a timer associated with it.
  • the timer is treated as relative value, instead of an absolute period.
  • the timer is added to the message date to define an expiration date for the message.
  • each message in the inbox may have the different expiration date, whereas in each mailbag, all of the messages therein will have a same expiration date.
  • the GPO 106 When the GPO 106 traverses the inbox, it checks the expiration date of each message against the current date to determine if the message has expired. If the message has expired, the GPO 106 invokes the rule engine 283, which processes the message against the rules in the gatekeeping rule base 289 to determine an appropriate action. This action may be any of the actions described above (release, delete, copy, forward, return). Alternatively, the action may be to move the message into one of the mailbags, such that the GPO 106 executes 449 the appropriate action for that mailbag upon expiration to the time parameter for that mailbag, as described above.
  • the operations of the GPO 106 and REPO 102 are concurrent and independent of each other.
  • a gatekeeper at a GPO may manually gate a message to another GPO 106.
  • a message may be automatically gated by one GPO 106 to another GPO 106, where it may be reviewed independently by another gatekeeper, or again, automatically by that second GPO 106.
  • This feature allows for either hierarchical or distributed gatekeeping of messages by any number of independently operating GPOs. That is, a message may be processed through a series GPOs 106, each of which may apply its own set of rules for processing and further handling the message. Thus, while a first or second GPO 106 may not delete or return a message, an nth GPO 106 may in fact delete the message or simply release it to its specified recipients.
  • FIGS. 4A and 4B The three phases of rule definition, message processing, and gating are illustrated in FIGS. 4A and 4B in a linear fashion, but it is understood that the distinct phases can operate concurrently with each other. That is, once rules are defined, the message processing phase operates as its own process on any number of REPOs 102. Similarly, the gating phase occurs concurrently at various GPOs 106. Thus, each phase contributes independently to the overall operation of the system.
  • the operation of the REPOs 102 and GPOs 106 is here described with respect to e-mail messages.
  • the present invention and the described embodiments are not limited to processing e-mail messages.
  • the present invention and the described embodiments also operate on any other types of data objects that may be distributed over a network.
  • a data server may be used in an organization to route data objects such as forms, spreadsheets, applets, code objects, database information, or any other type of data directly from a sender to any number of specified recipients, without being attached to an e-mail message.
  • the present invention enables the business rules to be applied to any such data objects at a REPO 102, and gated, if a rule is satisfied, to a GPO 106 for further review.
  • a business rule may be defined to return to sender any code object larger than a specified size, or to gate forms having a specific data type. This general ability of the present invention to apply business rules to any type of data object provides substantial control and flexibility in the management of corporate communications.
  • FIG. 5 there is shown a flow diagram of the process of defining business rules for a rule base 270 or GRB.
  • Rule definition proceeds with the administrator selecting 502 a REPO 102 for using a particular checkpoint or set of business rules.
  • FIG. 6 illustrates one user interface 600 for selecting a REPO 102, as provided by the GKADMIN 108.
  • Checkpoint field 602 indicates the name of a selected checkpoint.
  • the post office or post offices which are available to use the checkpoint are listed in window 604.
  • the user selects one or more of these post offices to use the named checkpoint.
  • the business rules defined within the checkpoint are listed in window 606 so that the administrator can determine the content of the checkpoint.
  • FIG. 7 illustrates a sample user interface 700 for designating bypass roles. Available roles 702 within the organization are shown in window 703. To obtain this role information, the GKADMIN 108 queries the organizational database 111 for all available roles 702. These roles 702 are then listed by the GKADMIN 108 in window 703. The administrator selects one or more of these roles 702 and moves them over to the assigned bypass roles window 705, where they are listed as bypass roles 704.
  • the implementation of bypass roles within the REPO 102 may vary. In one embodiment, bypass roles are implemented in the same fashion as other business rules, further described below.
  • the administrator next defines 506 any number of business rules for the checkpoint. These rules are stored within the rule base 270 of the REPO 102 or GPO 106 for which the checkpoint is being defined. Each rule defines a specific action to be taken when an attribute of a message or data object satisfies an operator with respect to a user-defined value.
  • the attributes may be static attributes of the message, such as message size, identity or number of recipients, number of destinations, message priority, message type, the text of the message, the subject line of the message, number of attachments, or the like.
  • Attributes may also be defined by performance or statistical attributes of the REPO 102 itself.
  • Useful performance or statistical data include the number of messages processed per hour by the post office, the average size of messages processed per hour, the average number of attachments per message, largest message size in past hour, largest attachment size, and so forth. Those of skill in the art will appreciate that many other performance or statistical measures may be used as attributes for rule processing.
  • Each data object has various properties, such as being a message, attachment, and so forth.
  • Each property has a name and an attribute.
  • the attachment property of a message has attributes such as the number, size, largest size, smallest size attachment. Any of the various attributes of a property can be the basis for an action by the distribution engine 230.
  • Business rules within a checkpoint may be classified (for purposes of explanation) into various classes: attachment rules, destination rules, destination level rules, message rules, sender rules, and post office rules according to the property of interest. Tables 1 through 6 describe each of these rule classes. Each table lists the available operators and values used to define the rule for each property and attribute.
  • FIG. 8 illustrates a sample user interface 800 of the GKADMIN 108 for defining business rule.
  • Each rule has a user-supplied name 802 or description for easily identifying the rule.
  • Each rule has an antecedent and a consequent.
  • the administrator selects the property 804 and attribute 803 upon which the rule operates from drop down menus containing alternatives for these aspects of the rule.
  • the administrator also selects an operator 806 as appropriate for the designated property the available operators are updated by the GKADMIN 108 according to the selected property and attribute.
  • the administrator then supplies or selects a value 808 of the appropriate type.
  • the GKADMIN 108 provides for type checking to ensure that the rule is well formed.
  • a business rule may have multiple conjuncts or disjuncts; the administrator indicates whether these apply and their type through buttons 810.
  • the administrator defines the rule consequent by specifying the action to be applied to a message satisfying the antecedent conditions.
  • the action is specified in action menu 812, and includes, as set forth previously, the actions of releasing, deleting, gating, copying, forwarding, or returning the message. Other user defined actions may also be implemented.
  • a reason 814 a user input text entry, may be optionally specified. This is particularly useful when the action is to return the message to the sender, or to gate the message, and thereby inform either the sender or the gatekeeper of the reason(s) why a message was not delivered.
  • the administrator specifies the destination by indicating in the gatekeeper address 816 the destination GPO 106 to receive the message, and the particular gatekeeper role within that GPO 106 for reviewing the message.
  • the action is executed, the message is delivered to the gatekeeper having the specified role.
  • Table 7 includes examples of useful business rules for use at a REPO 102:
  • the rules may be internally stored with the rule base 270 or gatekeeping rule base 289 by any of a number of useful implementing data structures.
  • the rules may be stored in tables in a relational database.
  • the rules are encoded in code point structures, as more completely described in "Data Management Using Nested Records And Code Points," U.S. Pat. No. 5,634,123.
  • FIG. 9 illustrates the code point model for a checkpoint and set of rules.
  • checkpoints 902 are container records that encapsulate further containers for rules.
  • Each checkpoint container 902 includes checkpoint data 904, for example, specifying the checkpoint name, the number of rules, number of bypass roles, and other checkpoint specific data.
  • Bypass role data 906 may also be specified using links to the organizational database 111.
  • Each rule container 908 encapsulates one or more antecedent containers 912 and an action container 922 for the rule action.
  • Each antecedent container 912 includes data records for the attribute 914, operator 916, and value 918 specified for the rule.
  • the attributes, operators, and actions are encoded with identification numbers, which the rule engine 210 engine uses to decode their specific meaning.
  • the action container 922 includes the encoded action data 924, and any arguments 926, such as destination address for gating or returning the message.
  • FIG. 10 there is shown an illustration of the data flow within a REPO 102.
  • Processing within a REPO 102 begins with the receipt of message data 201 by the receipt engine 200.
  • a receipt engine 200 For receiving an e-mail message a receipt engine 200 provides conventional post office functionality. Generally, the receipt engine 200 establishes a connection with a client e-mail application or other message source, and exchanges parameters for initialization of the data transfer. The receipt engine 200 then receives the message data 201. Upon completion of the receipt of the message data 201, the receipt engine 200 terminates the connection. This process is repeated each time a message is received.
  • the receipt engine 200 constructs a message object out of the message data 201.
  • Each message object has interfaces for accessing and manipulating data from its header components, message text, attachment, and other attributes and properties.
  • the receipt engine 200 passes a handle to the message object to the rule engine 210, which can then obtain the message object for applying the rules thereto.
  • the receipt engine 200 also provides the message object to the message index 240 for indexing and storage in the message store 250.
  • Some of the messages that a REPO 102 receives may have already been processed by another REPO 102 and gated for delivery to a GPO 106.
  • the messages are identified by the receipt engine 200 as being wrapped messages, and are provided by the receipt engine 200 directly to the distribution engine 230 for distribution. Wrapped messages are further explained below.
  • the rule engine 210 receives the message from the receipt engine 200, and processes it using the rules from the checkpoint assigned to the REPO 102. For each message, the rule engine 210 generates an action list of one or more actions to be performed by the distribution engine 230 on the message.
  • the action list may be associated with the message by an object handle or other association.
  • the distribution engine 230 traverses the action list for the message, and applies the action having the highest priority.
  • the rule engine 210 holds references to the rule base 270 for obtaining rules therefrom.
  • the rule engine 210 also holds a reference to the distribution engine 230 for invoking distribution of a message and passing the distribution engine 230 the action list 1107 for the message.
  • the rule engine 210 comprises three components, an attribute resolver 1103, an operand handler 1104, and an evaluator 1102.
  • the evaluator 1102 controls the overall evaluation of a message against all rules in a checkpoint. For each rule, the evaluator 1102 uses the attribute resolver 1103 to determine the attributes of the rule and the corresponding attributes of the message, and uses the operand handler 1104 to determine whether the attributes of the message satisfy the operand and value of the rule.
  • the attribute resolver 1103 returns a new attribute object with its value to the evaluator 1102, and the operand handler 1104 returns a truth value.
  • the evaluator 1102 outputs an action list object 1107 which stores the actions from those rules that were satisfied.
  • the action list 1107 includes a message ID which identifies the message and a list of actions as encoded values with their optional arguments.
  • the evaluator 1102 performs a high level true/false analysis over an entire checkpoint with respect to a set of rules. Referring to FIG. 12 there is shown a flow diagram of the operation of the evaluator 1102 for evaluating a particular message.
  • the evaluator 1102 receives a handle to the message from the receipt engine 200. The evaluator 1102 then traverses 1202 the rule base 270 for each checkpoint assigned to it. For each rule in the checkpoint (1204), the evaluator 1102 evaluates the antecedents of the rule with respect to the attributes of the message or performance attributes of the REPO 102. For each antecedent (1206), the evaluator 1102 invokes 1208 the attribute resolver 1103 and passes in the rule.
  • the attribute resolver 1103 is a state machine the calls the appropriate interface of a rule to obtain an attribute, and interfaces of a message to obtain an attribute thereof.
  • the attribute resolver 1103 also holds reference to the receipt engine 200, the distribution engine 230, and the organizational database 111 in order to obtain role information, or other attribute information.
  • the attribute resolver 1103 returns an attribute object which includes the value of the attribute extracted from the message, or from the distribution engine 230, and its type.
  • the attribute resolver 1103 operates as follows: The attribute resolver 1103 receives a reference to a message object and a reference to a rule object. The attribute resolver 1103 gets the attribute of the rule object. The attribute resolver 1103 then calls either the message object or the distribution engine 230 in order to obtain the appropriate attribute information. As noted above, the attribute information may be external to the rule, such as the performance data of the distribution engine 230, or other other statistical data from the post office.
  • the attribute resolver 1103 requests the message to provide the attribute information for the specific attribute. For example, the attribute resolver 1103 will determine that the attribute of particular rule is the "message size.” The attribute resolver 1103 then invokes the message to determine the corresponding attribute information from the message. In this example, the attribute resolver 1103 would obtain the size of the message. The attribute resolver 1103 then stores this message attribute information in a local cache.
  • the attribute resolver 1103 calls the distribution engine 230 to obtain the required data.
  • the attribute of the rule may be the server load, in which case the attribute resolver 1103 calls the distribution engine 230 to provide this data, which is again stored in a local cache.
  • the attribute resolver 1103 constructs an attribute object that stores the attribute data and its type. The attribute resolver 1103 then returns this attribute object to the evaluator 1102.
  • the attribute resolver 1103 invokes the organizational database 111 to determine the role of a particular user, and this information is stored in the attribute object.
  • the operand handler 1104 determines whether it is necessary to query the rule object to obtain more information than is available directly from the message, such as the uncompressed size of an attachment, an aggregate value that covers the domain of the message, or the run time environment of the REPO 102 or GPO 106.
  • the operand handler 1104 calls the attribute object to obtain the value of the attribute.
  • the operand handler 1104 calls the rule object to obtain the value specified in the rule.
  • the operand handler 1104 then compares the attribute value with the rule value using the operand from the rule. If the comparison is true, the operand handler 1104 returns "true" to the evaluator 1102, meaning the rule was satisfied. Otherwise, the operand handler 1104 returns "false.”
  • the attribute resolver 1103 receives the message object, obtains the message size, and constructs an attribute object storing the value of "50”, and passes this object back to the evaluator 1102.
  • the evaluator 1102 calls the operand handler 1104 with the attribute object and rule object.
  • the operand handler 1104 calls the rule object and obtains a value of "100" from the rule, and an operator of ">”.
  • the operand handler 1104 performs the greater than comparison of 50>100, which evaluates to "false.” This result is returned to the evaluator 1102 as the evaluation of the current antecedent.
  • the evaluator 1102 stores 1212 the result from the operand handler 1104, and then tests 1214 whether the conjunct of the rule is true. If the rule conjunct is true, the evaluator 1102 proceeds with the next antecedent. If the rule conjunct is not true, the evaluator 1102 proceeds with the next rule, since the current rule had a false conjunct, and thus failed to be satisfied.
  • the evaluator 1102 determines 1216 if all of the antecedents are true. If so, the evaluator 1102 obtains 1218 the action from the rule and stores the action in the action list, constructing a new action list object as necessary. The evaluator 1102 proceeds to evaluate the next rule.
  • the evaluator 1102 proceeds with the next checkpoint until done.
  • the evaluator 1102 then invokes 1220 the distribution engine 230 and passes the action list to it for handling.
  • bypass role processing 406 is handled by a set of rules, each of which define a bypass role in the antecedent, and a release action as the consequent. These rules are stored in a primary checkpoint which is evaluated (1202) as the first checkpoint during rule processing by the evaluator 1102.
  • the operation of the rule engine 210 is equally applicable to data objects other than e-mail messages, with the rule engine 210 and its components obtaining the appropriate attributes of a data object for applying a business rule thereto.
  • the distribution engine 230 completes the processing by applying the actions in the action list to the message. Referring now to FIG. 13 there is shown a flow diagram of the operation of the distribution engine 230 in processing messages.
  • the distribution engine 230 receives the action list and message from the rule engine 210. For each action in the action list (1302) the distribution engine 230 determines 1304 the priority of the action Priority information is held in a separate priority object; each action has a default priority level which may be adjusted by the administrator. The default priority levels (highest to lowest) for actions are ordered follows: Gate, Return, Forward, Copy, Delete, Release. The distribution engine 230 calls the priority object, passing the action from the action list, and obtains the priority level for the action.
  • the distribution engine 230 also maintains data for the current priority level, which is initially set to 0.
  • the distribution engine 230 compares 1306 the current priority level with the action's priority level. If the action priority is higher than the current priority, the distribution engine 230 updates 1308 the current priority with the action priority, and continues with the next action. If the current priority is higher, then the distribution engine 230 simply continues.
  • This process identifies the highest priority action or actions to be executed. Lower priority actions will not be executed. For example, if the highest priority action is to delete the message, then the lower priority release action will not be executed. Similarly, if the highest priority action is to gate the message, then there is no reason to copy the message. Accordingly, the distribution engine 230 deletes 1310 all actions with lower priority than the current priority level.
  • the distribution engine 230 then executes 1312 the remaining actions in the action list, in order.
  • the distribution engine 230 releases 1314 the message, sending it to the next distribution point for delivery to its specified recipients. It is still possible that the message will not be delivered to such recipients because it may be gated by another REPO 102 or GPO 106 within the system. The distribution engine 230 then continue 1312 with the next action in the action list.
  • the distribution engine 230 deletes 1316 the message, clears the action list and continues.
  • the distribution engine 230 returns 1318 the message to its sender, clears the action list, and continues.
  • the distribution engine 230 forwards 1319 the message to recipients specified in the action for the applicable rule, clears the action list, and continues.
  • the distribution engine 230 copies 1320 the message, and then releases the message for distribution.
  • FIG. 14 illustrates the structure of a wrapped message 1402.
  • the wrapped message 1402 contains a distribution list 1414 of all the GPOs 106 that are to review the message based on the rules that fired.
  • This distribution information is encoded in the action list, since each gate action includes the address of the gatekeeper and GPO 106 that is to receive the gated message.
  • the last addressee on this distribution list 1414 is the REPO 102 (or GPO 106) that is sending the message for gating.
  • the distribution engine 230 extracts this distribution information from the action list and stores it in the distribution list 1414. The usefulness of placing the REPO 102 last on the distribution list 1414 is explained further below.
  • the wrapped message 1402 also contains a rule history 1416 of the reasons why the message was removed from the normal distribution stream. Each rule is identified by a rule ID and a timestamp indicating when the rule was fired. This information is used by the GKI 107 to inform the gatekeeper of the reasons the message was gated.
  • the wrapped message 1402 contains flags 1404 indicating the status of the message.
  • the wrapped message contains a flag that indicates that the message should be delivered unabated from this point forward to the designated GPO 106. This allows the message to be immediately delivered to the GPO 106 without further processing.
  • the wrapped message 1402 includes the original message data 1406, including its header 1408, body 1410, and any attachments 1412.
  • the flags 1404, distribution list 1414 and rule history 1416 are preferably encoded after the message data 1406; in this manner these portions of the wrapped message are ignored by conventional post offices, which deliver the message in a conventional fashion. Only a REPO 102 or GPO 106 programmed in accordance with the present invention processes this wrapper information.
  • the distribution engine 230 distributes 1326 it to the first GPO 106 on the distribution list 1414.
  • the REPO 102 may itself receive messages from other REPOs 102. If these messages are wrapped messages, then they have already been gated and need not be reviewed by the rule engine 210 of the recipient REPO 102. The flag information in the wrapped messages indicates this status to the receipt engine 200.
  • the receipt engine 200 provides the wrapped message directly to the distribution engine 230, which exports an interface for directly releasing a message.
  • a GPO 106 is configured with the GKADMIN 108, instead of from within the executable of the GPO 106 itself. This lets an administrator easily configure any number of GPOs 106 on the network, without having to load and execute each one individually, which may not always be possible, since some GPOs 106 will execute on remote computers from the one being used by the administrator.
  • FIG. 16 illustrates a user interface 1600 from the GKADMIN 108 for designating a post office as a GPO 106.
  • the administrator checks the "Receives Gated Messages" box 1602 to designate a REPO 102 as being a GPO 106.
  • a GPO 106 may be changed back to a REPO 102, so that it no longer provides gatekeeping functionality.
  • the administrator specifies 1504 an interval time parameter and an optional time out action: for example, as illustrated in FIG. 16, fields 1604 and 1606 respectively, are the parameters associated with the gatekeeper's inbox in the GPO 106.
  • the interval time parameter is the number of minutes, hours, days, or other interval of time for which gated messages are left in the inbox to allow the gatekeeper to manually review the messages. This time value is added to the timestamp of each gated message as it is received at the GPO 106 to produce an expiration date for the message. As described above, the expiration date is then used by the GPO 106 to automatically initiate a further action to be applied to the message.
  • the optional time out action may be used to specify the action to be applied to all expired messages, rather than individual actions as would be applied from the business rules in the gatekeeping rule base 289.
  • FIG. 17 illustrates a sample user interface 1700 of the GKADMIN 108 for designating gatekeeper roles.
  • An organizational role 1702 is selected, and associated with a gatekeeper role 1704.
  • the roles used for assignment are stored in the organizational database 111.
  • the GKADMIN 108 creates a separate table of gatekeeper roles and stores this with the GPO 106 being configured.
  • FIG. 18 illustrates the operation of the receipt engine 282 for receiving messages, when a GPO 106 also includes rule processing functionality for handling non-gated messages.
  • the gatekeeping rule engine 283 operates to receive 1802 both conventional and gated (wrapped) messages from either conventional post offices, other GPOs 106, or REPOs 102, and processes these messages accordingly for handling by a gatekeeper (gated messages) or the distribution engine 284 (non-gated messages).
  • the low level operation of the receipt engine 282 for setting up and receiving a message is essentially the same as described above.
  • the receipt engine 282 differs in that it performs additional processing on a gated message.
  • the receipt engine 282 determines 1804 if the message is a gated message by whether it contains the additional wrapper information of the distribution list, flags, and rule history information. If the message is a gated message, then the receipt engine 282 provides 1810 the gated message to the inbox of the gatekeeper to whom the message is addressed. This gatekeeper can then review the gated message at a later point in time.
  • the receipt engine 282 updates the gatekeeping message index 287, including storing in the gatekeeping message index 287 the expiration date for the message, based on the timestamp of the message and upon the interval time parameter of that particular gatekeeper's inbox.
  • the receipt engine 282 sends 1806 the message to the regular message index 240 for indexing and storage, and then invokes 1808 the rule engine 210 to process the message in the same manner as described above, using the rule base 270.
  • wrapped (gated) messages are specifically diverted from further rule processing at this stage, but rather, stored in the inbox of the gatekeeper until such time as they are manually or automatically reviewed.
  • Each GPO 106 provides for manual review of messages by one or more persons having been designated the role of gatekeepers. At each GPO 106 there may be any number of assigned gatekeeper administrators (individuals responsible for reviewing gated messages). When a REPO 102 sends a gated message, the rule that fires indicates which gatekeeper is to review the message. The distribution engine 230 of the REPO 102 sends the message to the GPO 106 associated with the designated gatekeeper. As noted above, such a gated message is placed in the inbox of the gatekeeper for review.
  • the gatekeeper accesses gated messages through a separate utility program, the GKI 107, operates like a mail client, but includes additional functionality. Access through a separate utility program is desirable because the gatekeeper can thereby access any number of GPOs 106 for performing manual review of gated messages, instead of having to execute built-in functionality of each GPO 106.
  • the GKI 107 When the gatekeeper accesses a message in the inbox, the GKI 107 automatically unwraps the message and provides the wrapper information to the gatekeeper. This wrapper information tells the gatekeeper the rule history indicating which rules fired and hence the reason the message was gated, and the particular routing history for the message.
  • FIG. 19 illustrates a sample user interface of the GKI 107, the main gatekeeper screen 1901.
  • a gatekeeper logs into a GPO 106, she identifies which gatekeeper role she has; the GKI 107 then displays in the gatekeeper screen 1901 the messages 1916 that have been gated to that gatekeeper.
  • the sender, location, and the subject line of the message For each message, there is shown the sender, location, and the subject line of the message.
  • a status value 1903 informs the gatekeeper whether the message has only been gated, or reviewed.
  • the reason 1905 that the message has been gate is also shown, extracted from the rule history information in the wrapper of the message.
  • the main gatekeeper screen 1901 also displays a list of the mailbag folders that have been defined by the gatekeeper.
  • the gatekeeper can release 1909, return 1911, forward 1913, or file 1915 any message, by selection of the appropriate button.
  • the GKI 107 also provides the gatekeeper the ability to read and edit individual messages. To review a message, the gatekeeper selects the message and clicks on the review button 1907.
  • FIG. 20 illustrates a sample screen for reviewing messages. This screen 2001 includes specific fields identifying the sender, specified recipients, subject line, creation and arrival dates. In addition, there is shown the reason 2003 the message was gated, the release date 2005 of the message (which is its expiration date as determined when the message was placed in the inbox), and its retain date 2007, if any. The retain date 2007 is the date after which the GPO 106 will delete the message from the inbox. These dates may be manually changed by the gatekeeper.
  • the gatekeeper can edit the text of the message in the text field 2009, for example to remove offensive language, or confidential information.
  • the gatekeeper can immediately release 2011, return 2013, or forward 2015 a gated message. Forwarding a gated message enables the gatekeeper to send the message to another gatekeeper for additional review, as described above with respect to FIG. 4B; an additional screen is displayed (not shown) into which the gatekeeper can add instructions or information for the next gatekeeper. Forwarding a gated message also enables the gatekeeper to send the message to recipient(s) other than the specified recipient(s) for further processing and disposition.
  • FIG. 21 illustrates a screen 2100 used by a gatekeeper when returning a 8 message to the sender.
  • the gatekeeper can also include in text field 2101 an explanation to the sender of why the message was not delivered.
  • the gatekeeper may also move a message to a mailbag folder.
  • the expiration date of the message is updated according to the time parameter of the selected mailbag.
  • a gatekeeper's inbox may have a interval time parameter of 10 days
  • the gatekeeper has set the time parameter for a delete mailbag at 30 days
  • the last date the mailbag contents were deleted was Jan. 5, 1997.
  • a message is received with a timestamp of Jan. 1, 1998.
  • the gatekeeping message index 287 is updated with an expiration date for the message of Jan. 11, 1998. Now, assume that on Jan.
  • the gatekeeper manually reviews the message and decides to move it to the delete mailbag.
  • the expiration date of the message is automatically reset to Feb. 5, 1998, or 30 days after the last delete. This date will be the expiration date for all messages moved to this mailbag, up until Feb. 6, 1998, when the expiration date will be advanced to Mar. 5, 1998.
  • Automated review of gated messages is applied to those messages in the inbox of each gatekeeper which have not been manually reviewed prior to their individual expiration dates.
  • the automated review of messages is provided by additional functionality of the GPO 106, such as part of the program executive.
  • Automated review applies the rules defined by the gatekeeper in the gatekeeping rule base 289 to each expired message in the inbox.
  • Each gatekeeper can write their own rules in the gatekeeping rule base 289 for handling these gated messages, and can apply more detailed analysis and handling of gated messages.
  • Each gatekeeper defines rules for the gatekeeping rule base 289 in the same manner as described above for the rule base 270.
  • the rules engine 283 is the same as with the rule engine 210 of a REPO 102, because the rules written by a gatekeeper may be different from the rules at a REPO 102, a given message may be handled in a different manner.
  • the checkpoints of the REPO 102 are intended to operate on messages that are being rule processed for the first time
  • the rules of the gatekeeping rule base 289 are used to apply additional, and if necessary, more detailed review of the gated messages. More particularly, these rules can process the messages on the rule history information itself, in addition to all of the other properties and attributes used in the REPOs. This allows for very detailed rules to be applied to gated messages.
  • the gatekeeping rule base 289 rules can check the role of the sender and release the message for certain senders only, deleting the messages from all other senders.
  • the rule structure is applicable as before, with rules having both antecedent and consequent components.
  • the rule actions include the gate, delete, release, and return actions described above.
  • a review action specifies that the message is to be manually reviewed by a gatekeeper. During such review the gatekeeper administrator can edit the message. When a rule with a review action is fired, then the rule engine 283 moves the message to a review mailbag by updating the folder association for the message in the gatekeeping message index 287.
  • This review action is useful because it helps the gatekeeper identify messages which need to be specifically reviewed, and which the gatekeeper did not previously consider or attempt to review (since the message was automatically reviewed due to it expiring).
  • the actions available at the GPO 106 include actions for moving the message into one of the mailbags for delayed, periodic execution of the action for the mailbag.
  • a mailbag action takes as an argument the name of one of the mailbags in the master folder table 290.
  • the message is then associated with the specified mailbag in the gatekeeping message index 287.
  • the message will be acted upon according to the appropriate action for the mailbag when the time parameters of the specified mailbag are satisfied. For example, a rule may move a message into a mailbag with a retain date set for the end of the current month, at which time the message is deleted with other messages in the folder.
  • the GPO 106 periodically awakens the distribution engine 284 as a daemon process to process messages that have indexed in the inbox of each gatekeeper. For each message in the inbox (2202), the distribution engine 284 determines 2204 whether the message is expired, that is whether the current date is equal to, or greater than the expiration date. If the message is not expired, the distribution engine 284 continues with the next message in the inbox.
  • the distribution engine 284 invokes 2206 the rule engine 283 to apply the rules from the gatekeeping rule base 289 to the message. These rules are applied by the rule engine 283 as described above until one of the rules fires, or all rules are applied. As described above, the rule engine 283 returns an action list to the distribution engine 284 for the message. This action list identifies the action to be taken upon the message. Generally, the distribution engine 284 updates 2208 the gatekeeping message index 287 to indicate the specific action taken for the message. The distribution engine 284 then updates 2210 the distribution list, routing history, and rewraps the message, if necessary (some actions, such as delete, do not need the message to be rewrapped). The distribution engine 284 then continues with the next message. More specifically then, the distribution engine 284 handles the actions as follows:
  • the distribution engine 284 updates the gatekeeping message index 287 to indicate that the message is being returned.
  • the distribution engine 284 rewraps the message with updated history information, to indicate both that the message has been handled by this gatekeeper (storing the gatekeeper id in the wrapper) and to indicate the action taken.
  • the distribution engine 284 continues with the next message.
  • the distribution engine 284 updates the gatekeeping message index 287 to indicate that the message is being deleted. There is no need to rewrap the message. The message is then deleted. The distribution engine 284 continues with the next message.
  • the distribution engine 284 updates the gatekeeping message index 287 to indicate that the message is released.
  • the message is rewrapped with the gatekeeper ID and action taken (here forward and the reasons).
  • the distribution list is updated to place the GPO 106 of the new recipient as the next GPO 106 on the list; the current GPO 106 is added at the end of the distribution list.
  • the new recipient may be another gatekeeper, or it may be any other recipient to whom it is useful to send the message for further processing and response.
  • the distribution engine 284 then sends the message to the next GPO on the distribution list.
  • the distribution engine 284 continues with the next message.
  • the distribution engine 284 updates the gatekeeping message index 287 to indicate that the message is released.
  • the distribution engine 284 rewraps the message with the updated routing history so that the current gatekeeper, which is the first one on the routing history list, becomes a past gatekeeper.
  • the next gatekeeper on the routing list is copied to the recipient list for the message. This enables the message to be routed to another gatekeeper, if there is one. This will happen when the original REPO that gated the message indicated that more then one gatekeeper was to review the message. In this case, after the present gatekeeper is done, the recipient list is updated so that the next gatekeeper may receive the message for review.
  • the distribution engine 284 updates the gatekeeping message index 287 to place the message in the review mailbag for subsequent review by the gatekeeper.
  • an action for a message may be a mailbag action, which is to move the message to a particular mailbag.
  • the distribution engine 284 updates the gatekeeping message index 287 with an ID of the mailbag (as taken from the action).
  • the distribution engine 284 checks whether the time parameter for the designated mailbag has expired. If so then, the distribution engine 284 performs the function associated with the mailbag, whether to release, delete, forward or so forth, the messages in the mailbag.
  • a release action allows a message to continue from the GPO 106 unabated by any further rule processing by another other REPO 102 or GPO 106. Once released, the message is sent to the next GPO 106, if any on the distribution list are included in the wrapper. This allows for continued handling according to the original REPO 102 rules.
  • Each GPO 106 tags the message with its ID indicating that it has reviewed the message.
  • the last item on the distribution list is the original REPO 102; this data item was placed in the wrapper by the distribution engine 230 of the original REPO 102. Thus, the message is returned to the REPO 102 for further distribution.
  • the next distribution destination may be to another GPO 106 in the network which will apply its own rules. This feature enables very complex rule processing, and fully distributed and independent rule handling by any number of different GPOs 106.
  • the REPO 102 When the original REPO 102 gets the message back, it reprocesses the message and applies its rule from the rule base 270 again.
  • the list of gatekeepers in the wrapper who have reviewed the message is an "innoculant," and is used to prevent the REPO 102 from re-gating the message back to one of these gatekeepers, though the message may be gated to another gatekeeper at the same GPO 106.
  • the REPO 102 compares the list of gatekeepers who have seen the message, with the resulting list of gatekeepers from the new rule firing. If there is a match, then the message is not sent to the matching gatekeeper because that gatekeeper has already reviewed the message once before. In this manner, the message is gated only to gatekeepers who have not yet reviewed the message.
  • Reprocessing the message in this manner is desirable because there may have been changes in the rules of the original REPO 102 during the time period the message was being evaluated at the various GPOs 106, but it is assumed that a gatekeeper who has once reviewed a message need not review it again.
  • the present invention in its various embodiments, provides a system, method, and various software products for controlling the distribution of data objects, including e-mail messages, on a communication network.
  • the present invention applies business rules which can implement corporate communication policies, to such data objects as they are transferred through a post office or similar mail transfer agent.
  • the business rules that are satisfied by the properties and attributes of a data object generate a set of actions to be applied to the data object. These actions are applied to the data object.
  • the data object may be gated such that it is not delivered to its specified recipients, but rather to a gatekeeper who may manually review the message, or may allow it to be further reviewed automatically by yet another set of business rules. In this manner, fully distributed gatekeeping of any and all messages and data objects can be enforced in a networked environment.

Abstract

A system, method and various software products provide for automatic deferral and review of e-mail messages and other data objects in a networked computer system, by applying business rules to the messages as they are processed by post offices. The system includes rule enforcing post offices that store a plurality of business rules derived from business communication policies. The rule enforcing post offices receive messages from client applications and from other post offices and apply the business rules with a rule engine. The rule engine determines a set of actions, specified by business rules that are fired, to be applied to each message. The rule engine provides the actions to a distribution engine, which executes a highest priority action. Actions include releasing, deleting, returning, forwarding, or gating the message. Gating forwards the message to a gatekeeper, an administrator assigned to review messages for conformity with business policies or for other reasons. The gated messages are received by the gatekeeper at a gatekeeping post office. A gatekeeper can review the gated messages, and then manually release, delete, return, or further gate the message. Alternatively, if the gatekeeper does not review a gated message with a specified time period, the message is automatically reviewed by the gatekeeping post office with its own set of business rules. Having multiple post offices with independent sets of business rules allows for distributed and hierarchical review and gating of the messages. The system can route any type of data object, and apply the business rules to such objects in a similar manner.

Description

FIELD OF THE INVENTION
The present invention relates generally to electronic messaging systems, and more particularly to electronic messaging systems that enable the application of business communication policies for controlling distribution of electronic messages and other data objects.
BACKGROUND OF THE INVENTION
Many corporate organizations have elaborate methods to control the flow of memorandum, publications, notices, and other printed information within the organization. An organization may limit the types of documents employees can distribute at work, and in some cases, control which persons within an organization communicate with each other. For example, the organization may prohibit the distribution of memoranda to all employees in order to reduce photocopying costs; it may except this rule for individuals with specific corporate positions, such as the president or chairman. As another example, an organization may filter documents that are to be sent to specific persons or departments, or it may automatically copy (archive) documents distributed by certain persons or departments. Finally, organizations ordinarily have rules that prohibit distribution of certain types of documents, such as those containing disparaging, sexist, or profane materials. These various rules are typically documented as part of the organization's business communication policies, and managed by the personnel, human resources, or other departments.
Most organizations today also use electronic messaging systems, or e-mail, for inter- and intra-company communications. Generally, an e-mail system comprises one or more post offices, zero or more mail servers and a relatively large number of e-mail client applications. The post offices are distribution mechanisms which receive e-mail messages from client applications (both within the organization and external thereto) and transfer these e-mail messages to other post offices associated with the specified recipients, who again are both within and external to the organization or system. Conventional post offices operate on a store and forward model, where an e-mail message is stored only temporarily for the duration it takes to route the message to the next post office(s).
In e-mail systems which use mail servers, post offices deliver incoming messages to a mail server which persistently stores the messages for the recipients. The recipients access the messages via the client applications. In some systems where mail servers are not used, the post offices deliver e-mail messages directly to the client applications. The e-mail client applications are end-user applications for creating, reading, and managing a user's individual e-mail account.
The fundamental operating paradigm of conventional post offices and mail servers is unabated delivery, which is intended to deliver an e-mail message from its sender to its recipients as directly as possible, with no interference from other users or administrators. Thus, a conventional post office receives and routes a message as quickly as possible, and does not purposely delay routing in order to process or otherwise delay the message. Existing e-mail protocols, such as Simple Mail Transfer Protocol (Internet RFC 821), all are intended to operate by unabated delivery.
With the increasing reliance on e-mail for all types of corporate communications, it is becoming increasingly desirable for an organization to be able to define and automatically enforce communication policies with respect to the handling of e-mail messages in their e-mail systems. An organization should be able to define specific business rules which implement its business communication policies, and apply these business rules to all e-mail messages on the e-mail system in order to monitor and control the distribution and handling of e-mail messages. In particular, it is desirable to provide such business rules within a post office, so that the business rules may be applied to all e-mail messages handled by the post office, regardless of their origin or destination.
Conventionally, however, organizations have not had the ability to define and automatically enforce communication policies with respect to the handling of e-mail messages by post offices. This is because conventional post offices are designed to implement existing e-mail protocols, which are based on unabated delivery. As a result these post offices are not designed to apply business rules to e-mail messages which either intentionally delay or prohibit delivery of e-mail messages. Delayed, intercepted, or prohibited delivery is antithetical to the unabated delivery concept, and thus, conventional post offices do not provide this ability. Similarly, conventional mail servers, which normally only serve messages to client applications, do not process or otherwise delay message delivery in order to apply business rules thereto.
At best, most available e-mail systems do allow the individual user of the e-mail client application to define how e-mail messages received or sent by that specific e-mail client application are to be handled. For example, the user of an e-mail client application may decide to store e-mail messages received from particular senders in various mailbags or directories. However, conventional e-mail systems do not enable the organization to define specific business communication policy based rules for the post office itself to use in order to control the delivery of e-mail messages. Since all e-mail messages are received and routed by a post office, it is desirable to provide such ability directly at the post office rather than at the individual client application, which would at best provide only limited, and inconsistent rule application.
It should be noted that from a technical standpoint, conventional post offices do employ routing rules for routing and addressing e-mail messages. These rules however, are merely physical, data, or transport layer protocol rules (layers 2, 3, 4 of the OSI model), and describe only the low level handling of the e-mail message. Control of the delivery of e-mail messages by the post office itself is at the application or session layer (layer 7, 6). Thus, existing low level filtering rules do not provide the desirable ability to define business rules which implement business communication policies for handling e-mail messages.
E-mail messages are but one type of data object which are communicated over networks. In addition to the use of e-mail systems, organizations use their internal and external networks to distribute and route many other types of data objects, such as database records, forms, application programs, and so forth. However, there as yet appears no mechanism by which an organization can control the distribution of such data objects in light of business communication policies. Accordingly, it is desirable to provide a generalized data server that includes the ability to define business rules for handling the distribution of various types of data objects.
SUMMARY OF THE INVENTION
The present invention overcomes the deficiencies of conventional systems and provides the beneficial ability to define business rules that implement business communication policies for controlling the handling of e-mail messages and other data objects by a data server. In the present invention, a data server is an e-mail type post office that includes the ability to directly distribute any general form of data in addition to e-mail messages. The present invention enables the data server to monitor e-mail messages and other data objects, and to selectively gate, delete, forward, copy, release, or return e-mail messages and other data objects by applying the business rules to the messages and data received at the post office for delivery to others. Gating messages re-route the e-mail message from its specified recipients to a gatekeeper at a gatekeeping post office. Here, the gated message is additionally reviewed (either manually or automatically) and further processed, which again may include any of the above actions.
In accordance with one embodiment of the present invention for distribution of email and related data formats, a post office includes a receipt engine, a database of business rules, a rule engine, and a distribution engine. The receipt engine provides support for conventional e-mail protocols, such as SMTP or POP, so as to be able to receive e-mail messages from both internal client e-mail applications, and external e-mail systems.
The database of business rules are used to implement business communication polices of the organization. Each business rule describes a particular action to be applied to an e-mail message in response to either attributes of the e-mail message or performance data of the post office. For example, a business rule may specify actions such as deleting the e-mail message, gating the e-mail message for further review, copying the e-mail message, returning the e-mail message to its sender without delivering it, forwarding the e-mail message to a new recipient, or releasing an e-mail message to its specified recipients. The attributes of an e-mail message which may trigger application of a business rule include, for example, the size of the e-mail message, the number of attachments, the size of individual or all attachments, the text of the message or its subject line, the inclusion of specific addresses or distribution lists, and other message-specific attributes. For example, a business rule to gate an e-mail for further review may be triggered for any e-mail message that is addressed to the president of the company. As another example, a business rule that returns an e-mail message to its sender may be triggered when the e-mail message or its attachments exceed a certain size, or that are addressed to a particular distribution list, such as "All Employees."
Business rules may also be used at the post office to direct incoming e-mails to particular employees for further handling. For example, a business rule may forward an e-mail message from outside of the company to a particular employee or user (e.g., Marketing Director) when the text of message matches specific keywords or other properties (e.g., text within the message matching product name keywords), even where the employee is not one of the originally specified recipients.
These various types of business rules enable the organization to apply very detailed, automatic control over all e-mail messages being handled by one or more post offices in the company's e-mail system.
Alternatively, a business rule may be triggered by conditions completely external to any particular e-mail message being handled, but rather in response to statistical performance factors for the post office. For example, a business rule to defer delivery of an e-mail message may be triggered when the average throughput of the post office exceeds a defined threshold. Thus, the business rules may be responsive to any discrete factors that reflect the business communication policies of the organization.
In accordance with the present invention, the rule engine operates with the database to apply the business rules to each e-mail message, in order to determine a set of actions (one or more) to be applied to the e-mail message.
In accordance with another aspect of the present invention, there are defined "bypass roles" that enable an e-mail message to be released (delivered) without further rule application by the rule engine. Bypass roles are associated with specific corporate positions, rather than specific persons (or e-mail addresses). For example, the corporate position of President may be a bypass role, such that all e-mail messages from the President are released without further application of the business rules.
The rule engine provides for each e-mail message it processes a set of actions to the distribution engine. The distribution engine is responsible for handling the e-mail message according to the set of actions. These actions may instruct the distribution engine to release the e-mail message, gate the e-mail message by delivering it to a specified gatekeeping post office, delete the e-mail message without delivering it, return the e-mail message to the sender, and so forth, as described above. In one embodiment, each action has a predefined priority level. The distribution engine then reviews the set of actions and applies the action having the highest priority level. For example, assume that as the result of different business rules being applied by the rule engine, the set of actions includes both deleting the message and copying the message. Deleting an e-mail message may be defined as a higher priority action than copying the message. Accordingly, the distribution engine would delete the e-mail message, without copying it.
More particularly, the present invention provides the ability to gate e-mail messages by altering the delivery of the e-mail message from its specified recipients to a gatekeeping post office, where they are stored for further review and handling. These gated e-mail messages may be manually reviewed by a corporate administrator designated as a gatekeeper, and either released, returned to the sender, deleted, forwarded, or copied. The gated e-mail messages may also be automatically processed by an independent set of business rules, and again various different actions may be applied. Because each gatekeeping post office may act independently, it may further gate the e-mail message to yet another gatekeeping post office. This enables distributed, network gatekeeping and review of the e-mail messages by any number of corporate officials designated as gatekeepers.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is an illustration of a gatekeeping e-mail message system in accordance with the present invention.
FIG. 2 is an illustration of the software architecture of a rule enforcing post office.
FIG. 3 is an illustration of the software architecture of a gatekeeping post office.
FIGS. 4A and 4B are flow diagram of the overall process of gatekeeping e-mail messages.
FIG. 5 is a flow diagram of the process of defining business rules within the rule base.
FIG. 6 is an illustration of a user interface for selecting rule enforcing post office to use a checkpoint.
FIG. 7 is an illustration of a user interface for designating checkpoint bypass roles.
FIG. 8 is an illustration of a user interface for defining specific business rules.
FIG. 9 is an illustration of a code point model for storing business rules.
FIG. 10 is an illustration of the data flow within a rule enforcing post office.
FIG. 11 is an illustration of the data flow within a rule engine for processing a message using the rule base.
FIG. 12 is a flow diagram of the operation of the evaluator for evaluating an e-mail message with respect to the rule base.
FIG. 13 is a flow diagram of the operation of the distribution engine for handling e-mail messages based on the action list for each message.
FIG. 14 is an illustration of the structure of a wrapped message.
FIG. 15 is a flow diagram of a process for configuring a gatekeeping post office.
FIG. 16 is an illustration of a user interface for configuring a gatekeeping post office.
FIG. 17 is an illustration of user interface for assigning organizational roles to gatekeeper roles.
FIG. 18 is an illustration of the operation of the receipt engine of a gatekeeping post office.
FIG. 19 is an illustration of a user interface for accessing gated messages in a gatekeeper's inbox.
FIG. 20 is an illustration of a user interface for reviewing a gated message.
FIG. 21 is an illustration of a user interface for returning a gated message to its sender.
FIG. 22 is a flow diagram of the operation of the gatekeeping post office during automatic message processing.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
I. System and Operational Overview
Referring now to FIG. 1 there is shown one embodiment of a gatekeeping e-mail communication system of the present invention. An electronic communication system 100 operates on a conventional communications network 104, which may be a LAN, WAN, MAN, or the Internet.
Communicatively coupled to the network through conventional e-mail protocols, such as SMTP, POP3, and the like are one or more rule enforcing post offices 102 ("REPO 102") and one or more gatekeeping post offices 106 ("GPO 106"). In addition, a conventional post office 109 may be present to provide conventional mail transfer functionality for transferring e-mail messages to and from the REPOs 102, and GPOs 106. Additionally, conventional mail servers and conventional post office/mail server combinations may be present.
Communicatively coupled to REPOs 102 are conventional e-mail client applications 110. The e-mail client applications 110 are capable of generating and receiving e-mail messages in a conventional manner for individual users. Users may use the e-mail client applications 110 to address e-mail messages to other e-mail client applications 110 associated with any of the post offices 109, 102, 106. In this disclosure the terms "e-mail message" and "message" are used interchangeably and are intended to have the same meaning.
A gatekeeper administration program 108 ("GKADMIN 108") is used by system administrators to configure the various REPOs 102 and GPOs 106 of the system. A gatekeeper interface client 107 ("GKI 107") is used by individual gatekeepers to access and review gated messages. A gatekeeper is a human administrator assigned a gatekeeper role and having responsibility for reviewing gated messages.
An organizational database 111 stores organizational information, including an organizational hierarchy of organizational roles and the individuals assigned to such roles. This information is used by the REPOs 102 and GPOs 106 to apply various rules to messages based on the role of the sender or recipient.
II. Overview of a Rule Enforcing Post Office
A conventional post office acts as a mail transfer agent, and provides only for mail transfer based on a temporary store and forward model. A REPO 102 is a post office that, in addition to conventional functionality for transferring messages, enforces an organization's business communications policies by applying to each e-mail message received (either from local e-mail clients applications 110 or other remote post offices) business rules which define actions to be applied to an e-mail message according to various attributes of the message or the state of the REPO 102 itself.
Referring now to FIG. 2, there is shown the software architecture of one embodiment of a REPO 102. A REPO 102 includes functional modules for receiving, processing, and distributing e-mail messages to and from e-mail client applications 110 and other post offices (including REPOs 102, GPOs 106, and conventional post offices 109). These functional modules are provided by a receipt engine 200, a rule engine 210, and a distribution engine 230, respectively. Supporting data storage includes a message index 240 and a message store 250. Also included are a routing engine 220 and routing tables 260.
The receipt engine 200 provides a standard communication protocol interface (e.g., SMTP, MHS) to other post offices in order to receive e-mail messages from such post offices, and from any e-mail client applications 110 directly associated with the REPO 102. The receipt engine 200 temporarily indexes and stores received messages in the message index 240 and message store 250 during processing of the message. The message store 250 generally provides for temporary storage of message objects for subsequent distribution by the distribution engine 230. The message index 240 provides interfaces to the rule engine 210 and the distribution engine 230 to enable these modules to retrieve e-mail messages from the message store 250, to enable the rule engine 210 to access stored messages for processing prior to any distribution.
The routing engine 220 cooperates with the routing tables 260 in a conventional manner to determine, given recipient or addressee information of an incoming message, the proper post office and mail protocols for further delivery of the message. The routing engine 220 provides the routing information to the distribution engine 230 when necessary to continue delivery of the message.
The rule engine 210 operates in conjunction with a rule base 270 to process incoming messages with business rules defined in the rule base 270. The rule base 270 stores one or more sets of business rules. Business rules are input into the rule base 270 using the GKADMIN 111. In this disclosure, "business rule" and "rule" are used interchangeably and are intended to have the same meaning. Each set of business rules is referred to as a "checkpoint," and a REPO 102 is alternatively known as a checkpoint post office. Each business rule specifies an action to be applied to a message by the distribution engine 230. The actions are output by the rule engine 210 in the form of an action list which is read and interpreted by the distribution engine 230.
Instead of operating under the conventional unabated delivery paradigm, the distribution engine 230 handles e-mail messages in accordance with actions specified for the messages in the action list. The distribution engine 230 supports conventional mail protocols for delivering messages to other post offices, both conventional and servers such as the REPO 102 and GPO 106. One of the significant actions of the distribution engine 230 is to "gate" an e-mail message by delivering it to one or more GPOs 106 instead of delivering it to any of the recipients specified by the sender. This gating action enables administrative review of the e-mail message by a gatekeeper administrator prior to any delivery.
A REPO 102 may also include a mail server component, so that client applications may communicate with the mail server to receive messages delivered to the REPO 102. In this embodiment, when the REPO 102 receives a message for a specified recipient associated with the post office, it transfers the message to an inbox for the mail server, which in turn makes the message available to the appropriate mail client application. In this embodiment, a master table folder 280 is optionally provided that defines, typically for each user associated with the REPO 102, a collection of folders (also called "mailbags" herein) for indexing stored messages. In this variation, the message store 250 is used for persistent storage of messages, enabling them to be served to client applications by the mail server.
III. Overview of a Gatekeeping Post Office
A GPO 106 is a post office that provides for administrative review and processing of gated messages. A GPO 106 provides for both manual review by a gatekeeper--a person designated to review gated messages--and automatic review and processing using its own set of business rules. Processing applies various actions to gated messages, including deleting the message without delivering it to the specified recipients, returning a message to its sender, copying a message prior to sending, editing a message, forwarding the message to a new recipient, and releasing a message for distribution to its specified recipients. A GPO 106 provides for both immediate execution of these processing actions or delayed execution. Thus, the primary function of the GPO 106 operates contrary to the conventional unabated delivery model by adding an additional processing and review layer between the sending of the message and its receipt (if ever) by the originally specified recipients.
There are two basic embodiments of a GPO 106. First, a GPO 106 may provide only gatekeeping functionality, as a post office which only receives gated messages, but otherwise is not used to rule process other messages as does a REPO 102. Second, a GPO 106 may also include the functionality of a REPO 102, and receive both gated messages and non-gated messages, and provide all of the rule processing functionality of a REPO 102 on such incoming non-gated messages. For the purposes of this disclosure, this integrated embodiment will be discussed first.
Referring now to FIG. 3, there is shown one embodiment of a GPO 106. Like a REPO 102, a GPO 106 includes a receipt engine 282, a rule engine 283, and a distribution engine 284. The GPO 106 extends the functionality of the receipt engine 282 and distribution engine 284 to handle messages which have been gated to the GPO 102, including providing functionality for automatically reviewing messages.
The receipt engine 282 operates in a manner similar to that described above to receive messages and to provide these messages to other components for indexing, storage, and processing. Because the GPO 106 receives gated messages from other post offices, the receipt engine 200 includes additional functionality for handling gated messages. This additional functionality includes distinguishing gated messages from non-gated messages as messages are being received, and providing gated messages to the inbox of a gatekeeper while providing non-gated messages to the receipt engine 282 for rule processing as described above. Further, the GPO 106 includes additional functionality, for example, as part of its program executive, to automatically review messages on a periodic basis and perform defined actions upon such messages.
The rule engine 210 operates in conjunction with a gatekeeping rule base 289, which stores a set of business rules for handling gated messages, and with a rule base 270 as described above for handling non-gated messages. The rules for the gatekeeping rule base 289 may be different from the rules applied at one of the REPOs 102 in the rule base 270 of the GPO 106, and in particular can be specifically adapted by the administrator with the intent of handling gated messages received from a REPO 102 or other GPOs 106.
To support the receipt and review of gated messages outside of the conventional delivery paradigm, a GPO 106 provides a gatekeeping message index 287 and gatekeeping message store 288 which is used to store gated messages prior to review and processing. The gatekeeping message index 287 and gatekeeping message store 288 are preferably separate from the message index 285 and message store 286 used for storing messages during normal rule processing and transfer. This is because during the gatekeeping phase storage is transient, typically for only as long as necessary to process the messages. In contrast, the gatekeeping message index 287 and gatekeeping message store 288 are used for persistent storage of gated messages until reviewed and processed, which may require storage for extended periods of time (e.g., 30 days).
FIG. 2 illustrates this embodiment with two distinct message indices and message stores. A regular message index 285 indexes all regular (non-gated) messages received by the GPO 106, which are then stored in the regular message store 286. Gated messages however are indexed in a gatekeeping message index 287, and stored in the gatekeeping message store 288. The GPO 106 distinguishes a gated message from a non-gated message by whether or not it is a wrapped message.
Messages in the gatekeeping message index 287 are categorized into a number of folders for subsequent handling. In this disclosure the term "mailbag" is used interchangeably with the term "folder." The master folder table 290 defines these folders and their parameters. The master folder table 290 includes an inbox for each gatekeeper, into which gated messages for that gatekeeper are placed. Useful folders which may be defined include a return folder, a delete folder, and a release folder; other folders may also be created as needed by a gatekeeper. Each folder has a unique folder ID which is stored with the message in the message index 240 and a folder name.
In one embodiment, each folder has two time parameters associated with it: a release date and a retain date. The release date is the date on which all messages in the folder are released. The retain date is the date up to which all messages in the folder are retained, and then deleted on the specified date. Using these attributes, a gatekeeper can create any number of folders to release or delete gated messages after various times. The earliest time parameter is always executed first. FIG. 19, for example, shows a release folder 1902 with a release date of Jun. 1, 1997, and a delete folder 1904 with a retain date of Sep. 1, 1997.
In another embodiment, more sophisticated processing is provided with the folders. In this embodiment, each folder also has a time parameter, and an action associated with the folder. A folder action is a gatekeeper-defined action to be applied to the messages in the folder according to the time parameter. The actions include gating, forwarding, copying, deleting, or returning the messages. In addition, complex action sequences may also be defined by a gatekeeper, such as copying and then deleting messages. This flexible definition of the folder actions enables a gatekeeper to precisely control the processing applied to gated messages.
The time parameters may be either:
1. A delta time: This parameter specifies an amount of time after which a message in the folder is acted upon according to the folder action. The delta time is measured by the GPO 106 relative to a timestamp of the message.
2. A time interval: a periodic time interval for acting upon messages in the folder. All messages in the folder are acted upon according to the folder action at the same time upon expiration of the interval.
3. Fixed time: a specific date and/or time at which all messages in the folder are acted upon according to the folder action.
Generally, the inbox has a delta time parameter associated with it, while the other folders have a time interval parameter.
Each folder may also be associated with a gatekeeper role, which identifies the owner of the folder as the gatekeeper who created the folder. This allows the gatekeeper who created the folder to reset the time parameter and action.
An embodiment including two segregated message indices 285, 287 is desirable because it enables the rule engine 283 and the distribution engine 284 to very quickly distinguish gated messages which tend to have relatively long or persistent storage, from non-gated messages which are stored only on a temporary basis, without having to use processing time to filter the distinct types of messages from each other.
A gatekeeper accesses gated messages through the GKI 107. With this application, the gatekeeper manually reviews a gated message in an inbox assigned to that gatekeeper, and either directly acts upon the message to release, return, delete, copy, or edit the message, or delays disposition of the message by moving the message with one of the other folders which will be automatically processed at a later time. The GKI 107 also supports automatic processing of gated messages, as further explained below.
The REPOs 102 and the GPOs 106 are preferably implemented as software products executing on conventional server-class computers, such as Sun Microsystems Inc.'s SPARC™ based workstations and server, or IBM compatible computers based on Intel Inc.'s Pentium™ processors. The servers operate in conjunction with conventional operating systems, such as UNIX™, or Microsoft Corp.'s Windows95™ or WindowNT™.
IV. Operational Overview
Referring now to FIGS. 4A and 4B, there is shown a flowgraph of the overall process of processing and gating e-mail messages in accordance with the present invention. Operation of an e-mail system in accordance with the present invention may be understood as having three distinct phases: rule definition, message processing, and gating.
During the rule definition phase, an administrator or gatekeeper defines 402 various business rules for handling e-mail messages. In one embodiment, the rules are defined using the GKADMIN 108 which can directly edit the rule base of any GPO 106 or REPO 102. The business rules are preferably consistent with the business communication policies used by the business, or may extend or modify such communication policies. These business rules are stored in the rule base 270 of one or more REPOs 102. In addition, business rules for handling gated messages are created and stored in the gatekeeping rule base 289 of one or more GPOs 106. It is anticipated that the business rules stored in the REPOs 102 will be different in some respect than those stored in the GPOs 106, since the function of a GPO 106 is to further process messages that have already once been processed and gated by a REPO 102.
In addition to defining various business rules for specific actions to be applied to messages, the administrator may also define bypass roles. A bypass role is an organizational position within the organization for which a message from a sender with a bypass role is passed through a REPO 102 without any other rule processing. For example, the president of the company would be a typical bypass role, and all messages from the president would then not be subject to the other rule processing or gating operations of a REPO 102. Thus, bypass roles are used to define the exceptional case of unabated delivery in the context of the invention. The bypass roles are defined with respect to company position, and not with respect to actual user names. This allows a change in the holder of the bypass role, without the administrator having to manually redefine the bypass role, as would be the case if the bypass ability were directly associated with a user name. The role information for bypass roles is held in the organizational database 111.
In the message processing phase, the REPOs 102 and GPOs 106 are operational for receiving and distributing messages. A message is received 404 at a REPO 102 from another post office or client application. With the REPO 102, the receipt engine 200 indexes the message in the message index 240 and provides it to the rule engine 210. The rule engine 210 checks 406 whether the sender has a bypass role. If so, the message is released 408 by the distribution engine 230. The message may be delivered to the specified recipients at other post offices, or it may be gated at a REPO 102 that does not recognize the particular bypass role.
If the sender of the message does not have a bypass role, the rule engine 210 processes 410 the message with the business rules in the rule base 270 to determine the appropriate action(s) for handling the message. Typically, at least one business rule will be satisifed, and thereby specify the action to be applied to the message. The action is communicated to the distribution engine 230, which applies 412 the action to the message. If there are multiple actions, the distribution engine 230 selects a highest priority action, and applies it to the message. The distribution engine 230 may release 408, return 416, gate 418, copy 420, forward 421, or delete 422 the message. When a message is gated 418, it is not delivered to its initially specified recipients. Instead, the gating action specifies a gatekeeper role at a GPO 106 who is to review the message. Accordingly, the distribution engine 230 sends the message to this gatekeeper. When a message is forwarded 421, it is delivered to a new recipient, typically one other than a specified recipient; the new recipient is specified by the applicable business rule which was satisfied.
A REPO 102 operates continuously in this mode of receiving and processing messages. A GPO 106 which includes rule processing functionality on incoming messages also operates in this manner with respect to non-gated messages.
The gating phase is applied by a GPO 106 to messages that have been gated 418 by a REPO 102 or other GPO 106. A gated message is received 424 at a GPO 106, indexed in the gatekeeping message index 287 and initially placed in an inbox for the gatekeeper to whom the message has been gated.
The present invention provides for two types of gatekeeping review, manual review and automatic review. Each of these types of reviews may result in actions that are immediately executed, or actions for which execution is delayed.
During manual review, the gatekeeper evaluates 428 any or all of the messages in the inbox, and may immediately execute an action on the message, including releasing 430 the message, returning 432 the message to its sender (with or without an explanation as to why it was returned and not delivered), deleting 434 the message, copying 436 the message, and gating the message by forwarding 438 it to yet another gatekeeper, or otherwise forwarding 438 the message to another recipient for further handling. In addition, the gatekeeper can edit 440 a message, for example to remove offensive language, delete an attachment, or the like. After editing, the gatekeeper can release 430 the message for further delivery (to the specified recipients or other recipients), or return 432 it to the sender with an explanation of why the message was not delivered.
Alternatively, the gatekeeper may decide to delay execution of an action such that it is applied to a set of messages instead of individually. For delayed execution, the gatekeeper moves 442 a message to a mailbag which has a defined time parameter. The mailbag may have a specifically defined action, such as a release mailbag 444, a return mailbag 445, a delete mailbag 446, a forward mailbag 447, or a review mailbag 448, or it may simply have a release and retain date. The GPO 106 periodically checks the time parameters of the various mailbags and executes 449 an appropriate action for each mailbag upon expiration of its time parameter. For example, a delete mailbag 446 may have an interval time parameter of 30 days; all messages in this mailbag are deleted once every 30 days. Alternatively, a release mailbag 444 may have a specific release date, and the GPO 106 checks to see if the current date matches the release date, and if so, releases the messages in the mailbag. This approach lets a gatekeeper manually review some messages and immediately act on some messages, while delaying actions on other messages.
In addition, the gatekeeper may review the message and not perform any action on it at all, including not releasing the message. In this instance, the message simply remains in the gatekeeper's inbox.
Automatic review is also provided by the GPO 106, for example as part of its basic functionality or program executive. For those messages which the gatekeeper does not evaluate 426 or which remain in the inbox, the GPO 106 operates a daemon process, and periodically wakes up and processes all messages in the gatekeeper's inbox. The inbox has a timer associated with it. Here however, the timer is treated as relative value, instead of an absolute period. When a gated message is received, the timer is added to the message date to define an expiration date for the message. Thus, each message in the inbox may have the different expiration date, whereas in each mailbag, all of the messages therein will have a same expiration date.
When the GPO 106 traverses the inbox, it checks the expiration date of each message against the current date to determine if the message has expired. If the message has expired, the GPO 106 invokes the rule engine 283, which processes the message against the rules in the gatekeeping rule base 289 to determine an appropriate action. This action may be any of the actions described above (release, delete, copy, forward, return). Alternatively, the action may be to move the message into one of the mailbags, such that the GPO 106 executes 449 the appropriate action for that mailbag upon expiration to the time parameter for that mailbag, as described above.
The operations of the GPO 106 and REPO 102 are concurrent and independent of each other.
As noted, a gatekeeper at a GPO may manually gate a message to another GPO 106. Also, a message may be automatically gated by one GPO 106 to another GPO 106, where it may be reviewed independently by another gatekeeper, or again, automatically by that second GPO 106. This feature allows for either hierarchical or distributed gatekeeping of messages by any number of independently operating GPOs. That is, a message may be processed through a series GPOs 106, each of which may apply its own set of rules for processing and further handling the message. Thus, while a first or second GPO 106 may not delete or return a message, an nth GPO 106 may in fact delete the message or simply release it to its specified recipients.
The three phases of rule definition, message processing, and gating are illustrated in FIGS. 4A and 4B in a linear fashion, but it is understood that the distinct phases can operate concurrently with each other. That is, once rules are defined, the message processing phase operates as its own process on any number of REPOs 102. Similarly, the gating phase occurs concurrently at various GPOs 106. Thus, each phase contributes independently to the overall operation of the system.
The operation of the REPOs 102 and GPOs 106 is here described with respect to e-mail messages. However, the present invention and the described embodiments are not limited to processing e-mail messages. The present invention and the described embodiments also operate on any other types of data objects that may be distributed over a network. For example, a data server may be used in an organization to route data objects such as forms, spreadsheets, applets, code objects, database information, or any other type of data directly from a sender to any number of specified recipients, without being attached to an e-mail message. The present invention enables the business rules to be applied to any such data objects at a REPO 102, and gated, if a rule is satisfied, to a GPO 106 for further review. For example, a business rule may be defined to return to sender any code object larger than a specified size, or to gate forms having a specific data type. This general ability of the present invention to apply business rules to any type of data object provides substantial control and flexibility in the management of corporate communications.
V. Establishing Business Rules
Referring now to FIG. 5, there is shown a flow diagram of the process of defining business rules for a rule base 270 or GRB. Rule definition proceeds with the administrator selecting 502 a REPO 102 for using a particular checkpoint or set of business rules. FIG. 6 illustrates one user interface 600 for selecting a REPO 102, as provided by the GKADMIN 108. Checkpoint field 602 indicates the name of a selected checkpoint. The post office or post offices which are available to use the checkpoint are listed in window 604. The user selects one or more of these post offices to use the named checkpoint. The business rules defined within the checkpoint are listed in window 606 so that the administrator can determine the content of the checkpoint.
The administrator then designates 504 the bypass roles applicable to the checkpoint. The current bypass roles are listed in window 608. The administrator defines new bypass roles by designating various positions within the organization. FIG. 7 illustrates a sample user interface 700 for designating bypass roles. Available roles 702 within the organization are shown in window 703. To obtain this role information, the GKADMIN 108 queries the organizational database 111 for all available roles 702. These roles 702 are then listed by the GKADMIN 108 in window 703. The administrator selects one or more of these roles 702 and moves them over to the assigned bypass roles window 705, where they are listed as bypass roles 704. The implementation of bypass roles within the REPO 102 may vary. In one embodiment, bypass roles are implemented in the same fashion as other business rules, further described below.
The administrator next defines 506 any number of business rules for the checkpoint. These rules are stored within the rule base 270 of the REPO 102 or GPO 106 for which the checkpoint is being defined. Each rule defines a specific action to be taken when an attribute of a message or data object satisfies an operator with respect to a user-defined value. The attributes may be static attributes of the message, such as message size, identity or number of recipients, number of destinations, message priority, message type, the text of the message, the subject line of the message, number of attachments, or the like.
Attributes may also be defined by performance or statistical attributes of the REPO 102 itself. Useful performance or statistical data include the number of messages processed per hour by the post office, the average size of messages processed per hour, the average number of attachments per message, largest message size in past hour, largest attachment size, and so forth. Those of skill in the art will appreciate that many other performance or statistical measures may be used as attributes for rule processing.
Each data object has various properties, such as being a message, attachment, and so forth. Each property has a name and an attribute. For example, the attachment property of a message has attributes such as the number, size, largest size, smallest size attachment. Any of the various attributes of a property can be the basis for an action by the distribution engine 230.
Operators include arithmetic operators (=, <, >, --, 2, 3) and content-oriented operators (has does not have; is in: is not in). Values may be numeric, text, or labels.
Business rules within a checkpoint may be classified (for purposes of explanation) into various classes: attachment rules, destination rules, destination level rules, message rules, sender rules, and post office rules according to the property of interest. Tables 1 through 6 describe each of these rule classes. Each table lists the available operators and values used to define the rule for each property and attribute.
              TABLE 1                                                     
______________________________________                                    
Attachment Rules                                                          
Property                                                                  
        Attribute     Operator      Value                                 
______________________________________                                    
Attachments                                                               
        Total count   Equals, Not equal,                                  
                                    Specific                              
                      Greater or equal, Less                              
                                    number                                
                      or equal, Greater,                                  
                      Less                                                
        Memo count (number                                                
                      Equals, Not equal,                                  
                                    Specific                              
        of memo       Greater or equal, Less                              
                                    number                                
        attachments)  or equal, Greater,                                  
                      Less                                                
        File count (number of                                             
                      Equals, Not equal,                                  
                                    Specific                              
        file attachments)                                                 
                      Greater or equal, Less                              
                                    number                                
                      or equal, Greater,                                  
                      Less                                                
        Other count (number                                               
                      Equals, Not equal,                                  
                                    Specific                              
        of attachments of,                                                
                      Greater or equal, Less                              
                                    number                                
        types other than,                                                 
                      or equal, Greater,                                  
        memo or file  Less                                                
        Attachment size,                                                  
                      Equals, Not equal,                                  
                                    Specific                              
        (total) (total size of all                                        
                      Greater or equal, Less                              
                                    size                                  
        attachments)  or equal, Greater,                                  
                                    in (kilo-                             
                      Less          bytes)                                
        Largest, attachment                                               
                      Equals, Not equal,                                  
                                    Specific                              
        size          Greater or equal, Less                              
                                    size                                  
                      or equal, Greater,                                  
                                    in (kilo-                             
                      Less          bytes)                                
        Smallest, attachment                                              
                      Equals, Not equal,                                  
                                    Specific                              
        size          Greater or equal, Less                              
                                    size                                  
                      or equal, Greater,                                  
                                    in (kilo-                             
                      Less          bytes)                                
______________________________________                                    
                                  TABLE 2                                 
__________________________________________________________________________
Destination Rules                                                         
Property                                                                  
      Attribute Operator  Value                                           
__________________________________________________________________________
Destination                                                               
      Contains list                                                       
                Equal, Not equal                                          
                          Yes or No                                       
      Number of recipients                                                
                Equals, Not equal,                                        
                          Specific number                                 
                Greater or equal, Less                                    
                or equal, Greater,                                        
                Less                                                      
      Number of locations                                                 
                Equals, Not equal,                                        
                          Specific number                                 
                Greater or equal, Less                                    
                or equal, Greater,                                        
                Less                                                      
      Distribution list                                                   
                Has, Does not have                                        
                          Specific distribution,                          
                          list                                            
      Locations Has, Does not have                                        
                          Specific post office                            
                Is In, Is Not In                                          
                          Specific distribution,                          
                          list                                            
      Role      Has, Does not have                                        
                          Specific role                                   
__________________________________________________________________________
              TABLE 3                                                     
______________________________________                                    
Destination Level Rules                                                   
Property Attribute Operator       Value                                   
______________________________________                                    
Destination,                                                              
         Level name                                                       
                   Equals, Not equal,                                     
                                  Specific level                          
Level              Greater or equal, Less                                 
                   or equal, Greater,                                     
                   Less                                                   
______________________________________                                    
              TABLE 4                                                     
______________________________________                                    
Message Rules                                                             
Property                                                                  
       Attribute   Operator       Value                                   
______________________________________                                    
Message                                                                   
       Revisable   Equals         Yes or No                               
       Confidential                                                       
                   Equals         Yes or No                               
       Priority    Equals, Not Equal                                      
                                  Low, Medium,                            
                                  or High                                 
       Size (in Kb)                                                       
                   Equals, Not equal,                                     
                                  Specific size                           
                   Greater or equal, Less                                 
                                  (in                                     
                   or equal, Greater,                                     
                                  kilobytes)                              
                   Less                                                   
       From/MSG Type                                                      
                   Equals, Not equal                                      
                                  A Form or                               
                                  A Message                               
       From Program                                                       
                   Equals, Not equal                                      
                                  Yes or No                               
       To Program  Equals, Not equal                                      
                                  Yes or No                               
______________________________________                                    
              TABLE 5                                                     
______________________________________                                    
Sender Rules                                                              
Property                                                                  
        Attribute Operator      Value                                     
______________________________________                                    
Sender  Role      Has, Does not have                                      
                                Specific role                             
        Post Office                                                       
                  Equals, Not equal                                       
                                Specific post office                      
                  Is In, Is Not In                                        
                                Distribution list                         
______________________________________                                    
              TABLE 6                                                     
______________________________________                                    
Post Office Rules                                                         
Property                                                                  
        Attribute Operator       Value                                    
______________________________________                                    
Post Office                                                               
        Messages  Equals, Not equal,                                      
                                 Specific number                          
        Per Hour  Greater or equal, Less                                  
                  or equal, Greater,                                      
                  Less                                                    
        Average   Equals, Not equal,                                      
                                 Specific number                          
        Message   Greater or equal, Less                                  
        Size      or equal, Greater,                                      
                  Less                                                    
        Largest   Equals, Not equal,                                      
                                 Specific number                          
        Attachment                                                        
                  Greater or equal Less                                   
        Size      or equal, Greater,                                      
                  Less                                                    
______________________________________                                    
FIG. 8 illustrates a sample user interface 800 of the GKADMIN 108 for defining business rule. Each rule has a user-supplied name 802 or description for easily identifying the rule. Each rule has an antecedent and a consequent. To define the antecedent, the administrator selects the property 804 and attribute 803 upon which the rule operates from drop down menus containing alternatives for these aspects of the rule. The administrator also selects an operator 806 as appropriate for the designated property the available operators are updated by the GKADMIN 108 according to the selected property and attribute. The administrator then supplies or selects a value 808 of the appropriate type. The GKADMIN 108 provides for type checking to ensure that the rule is well formed.
A business rule may have multiple conjuncts or disjuncts; the administrator indicates whether these apply and their type through buttons 810.
Once the antecedent is defined, the administrator defines the rule consequent by specifying the action to be applied to a message satisfying the antecedent conditions. The action is specified in action menu 812, and includes, as set forth previously, the actions of releasing, deleting, gating, copying, forwarding, or returning the message. Other user defined actions may also be implemented. A reason 814, a user input text entry, may be optionally specified. This is particularly useful when the action is to return the message to the sender, or to gate the message, and thereby inform either the sender or the gatekeeper of the reason(s) why a message was not delivered.
Where the specified action is to gate the message, as shown in the example of FIG. 8, the administrator specifies the destination by indicating in the gatekeeper address 816 the destination GPO 106 to receive the message, and the particular gatekeeper role within that GPO 106 for reviewing the message. When the action is executed, the message is delivered to the gatekeeper having the specified role.
As indicated by the various possibilities in Tables 1-6, there is a large variety of different types of business rules that may be constructed. Table 7 includes examples of useful business rules for use at a REPO 102:
              TABLE 7                                                     
______________________________________                                    
Sample Business Rules                                                     
Antecedent             Consequent                                         
Property                                                                  
        Attribute                                                         
                 Operator Value  Action                                   
______________________________________                                    
Message Size     >        100 kb Return to Sender                         
Message Text     Has      "Product                                        
                                 Forward to Marketing                     
                          X"     Dept.                                    
Attachments                                                               
        Number   >        10     Return to Sender                         
Destination                                                               
        Role     Has      President                                       
                                 Gate to Gatekeeper                       
Sender  Role     Has      President                                       
                                 Copy and Release                         
Server  Message  >        100    Return to Sender                         
        Load              messages                                        
______________________________________                                    
The rules may be internally stored with the rule base 270 or gatekeeping rule base 289 by any of a number of useful implementing data structures. In one embodiment, the rules may be stored in tables in a relational database.
In another embodiment, the rules are encoded in code point structures, as more completely described in "Data Management Using Nested Records And Code Points," U.S. Pat. No. 5,634,123. FIG. 9 illustrates the code point model for a checkpoint and set of rules. In this embodiment, checkpoints 902 are container records that encapsulate further containers for rules. Each checkpoint container 902 includes checkpoint data 904, for example, specifying the checkpoint name, the number of rules, number of bypass roles, and other checkpoint specific data. Bypass role data 906 may also be specified using links to the organizational database 111.
Each rule container 908 encapsulates one or more antecedent containers 912 and an action container 922 for the rule action. Each antecedent container 912 includes data records for the attribute 914, operator 916, and value 918 specified for the rule. The attributes, operators, and actions are encoded with identification numbers, which the rule engine 210 engine uses to decode their specific meaning. There is alsoa value stored 920 indicating whether or not there is another conjunct or disjunct in the rule. The action container 922 includes the encoded action data 924, and any arguments 926, such as destination address for gating or returning the message.
VI. Applying Business Rules to E-mail Messages
Referring now to FIG. 10, there is shown an illustration of the data flow within a REPO 102. Processing within a REPO 102 begins with the receipt of message data 201 by the receipt engine 200. For receiving an e-mail message a receipt engine 200 provides conventional post office functionality. Generally, the receipt engine 200 establishes a connection with a client e-mail application or other message source, and exchanges parameters for initialization of the data transfer. The receipt engine 200 then receives the message data 201. Upon completion of the receipt of the message data 201, the receipt engine 200 terminates the connection. This process is repeated each time a message is received.
As the message data 201 is being received, the receipt engine 200 constructs a message object out of the message data 201. Each message object has interfaces for accessing and manipulating data from its header components, message text, attachment, and other attributes and properties. After the message object is constructed, the receipt engine 200 passes a handle to the message object to the rule engine 210, which can then obtain the message object for applying the rules thereto. The receipt engine 200 also provides the message object to the message index 240 for indexing and storage in the message store 250.
Some of the messages that a REPO 102 receives may have already been processed by another REPO 102 and gated for delivery to a GPO 106. The messages are identified by the receipt engine 200 as being wrapped messages, and are provided by the receipt engine 200 directly to the distribution engine 230 for distribution. Wrapped messages are further explained below.
The rule engine 210 receives the message from the receipt engine 200, and processes it using the rules from the checkpoint assigned to the REPO 102. For each message, the rule engine 210 generates an action list of one or more actions to be performed by the distribution engine 230 on the message. The action list may be associated with the message by an object handle or other association.
The distribution engine 230 traverses the action list for the message, and applies the action having the highest priority.
Rule Processing
Referring now to FIG. 11, there is shown the data flow within a rule engine 210 for processing a message. The rule engine 210 holds references to the rule base 270 for obtaining rules therefrom. The rule engine 210 also holds a reference to the distribution engine 230 for invoking distribution of a message and passing the distribution engine 230 the action list 1107 for the message.
The rule engine 210 comprises three components, an attribute resolver 1103, an operand handler 1104, and an evaluator 1102. The evaluator 1102 controls the overall evaluation of a message against all rules in a checkpoint. For each rule, the evaluator 1102 uses the attribute resolver 1103 to determine the attributes of the rule and the corresponding attributes of the message, and uses the operand handler 1104 to determine whether the attributes of the message satisfy the operand and value of the rule. The attribute resolver 1103 returns a new attribute object with its value to the evaluator 1102, and the operand handler 1104 returns a truth value.
Because a message may satisfy any number of rules within a checkpoint, the evaluator 1102 outputs an action list object 1107 which stores the actions from those rules that were satisfied. The action list 1107 includes a message ID which identifies the message and a list of actions as encoded values with their optional arguments.
As noted above, the evaluator 1102 performs a high level true/false analysis over an entire checkpoint with respect to a set of rules. Referring to FIG. 12 there is shown a flow diagram of the operation of the evaluator 1102 for evaluating a particular message.
The evaluator 1102 receives a handle to the message from the receipt engine 200. The evaluator 1102 then traverses 1202 the rule base 270 for each checkpoint assigned to it. For each rule in the checkpoint (1204), the evaluator 1102 evaluates the antecedents of the rule with respect to the attributes of the message or performance attributes of the REPO 102. For each antecedent (1206), the evaluator 1102 invokes 1208 the attribute resolver 1103 and passes in the rule.
The attribute resolver 1103 is a state machine the calls the appropriate interface of a rule to obtain an attribute, and interfaces of a message to obtain an attribute thereof. The attribute resolver 1103 also holds reference to the receipt engine 200, the distribution engine 230, and the organizational database 111 in order to obtain role information, or other attribute information. The attribute resolver 1103 returns an attribute object which includes the value of the attribute extracted from the message, or from the distribution engine 230, and its type.
The attribute resolver 1103 operates as follows: The attribute resolver 1103 receives a reference to a message object and a reference to a rule object. The attribute resolver 1103 gets the attribute of the rule object. The attribute resolver 1103 then calls either the message object or the distribution engine 230 in order to obtain the appropriate attribute information. As noted above, the attribute information may be external to the rule, such as the performance data of the distribution engine 230, or other other statistical data from the post office.
For message attributes, the attribute resolver 1103 requests the message to provide the attribute information for the specific attribute. For example, the attribute resolver 1103 will determine that the attribute of particular rule is the "message size." The attribute resolver 1103 then invokes the message to determine the corresponding attribute information from the message. In this example, the attribute resolver 1103 would obtain the size of the message. The attribute resolver 1103 then stores this message attribute information in a local cache.
For an aggregate or performance attribute of the distribution engine 230, the attribute resolver 1103 calls the distribution engine 230 to obtain the required data. For example, the attribute of the rule may be the server load, in which case the attribute resolver 1103 calls the distribution engine 230 to provide this data, which is again stored in a local cache.
With the attribute information, the attribute resolver 1103 constructs an attribute object that stores the attribute data and its type. The attribute resolver 1103 then returns this attribute object to the evaluator 1102.
For bypass roles, the attribute resolver 1103 invokes the organizational database 111 to determine the role of a particular user, and this information is stored in the attribute object.
After receiving the attribute object from the attribute resolver 1103, the evaluator 1102 invokes 1208 the operand handler 1104, and passes the rule and the attribute object to the operand handler 1104. First, the operand handler 1104 determines whether it is necessary to query the rule object to obtain more information than is available directly from the message, such as the uncompressed size of an attachment, an aggregate value that covers the domain of the message, or the run time environment of the REPO 102 or GPO 106. The operand handler 1104 calls the attribute object to obtain the value of the attribute. The operand handler 1104 calls the rule object to obtain the value specified in the rule. The operand handler 1104 then compares the attribute value with the rule value using the operand from the rule. If the comparison is true, the operand handler 1104 returns "true" to the evaluator 1102, meaning the rule was satisfied. Otherwise, the operand handler 1104 returns "false."
For example, assume a rule:
IF message size>100 kb THEN Return message.
Further assume a message with a message size of 50 kb.
Here the attribute resolver 1103 receives the message object, obtains the message size, and constructs an attribute object storing the value of "50", and passes this object back to the evaluator 1102. The evaluator 1102 calls the operand handler 1104 with the attribute object and rule object. The operand handler 1104 calls the rule object and obtains a value of "100" from the rule, and an operator of ">". The operand handler 1104 performs the greater than comparison of 50>100, which evaluates to "false." This result is returned to the evaluator 1102 as the evaluation of the current antecedent.
The evaluator 1102 stores 1212 the result from the operand handler 1104, and then tests 1214 whether the conjunct of the rule is true. If the rule conjunct is true, the evaluator 1102 proceeds with the next antecedent. If the rule conjunct is not true, the evaluator 1102 proceeds with the next rule, since the current rule had a false conjunct, and thus failed to be satisfied.
When all antecedents are evaluated, the evaluator 1102 determines 1216 if all of the antecedents are true. If so, the evaluator 1102 obtains 1218 the action from the rule and stores the action in the action list, constructing a new action list object as necessary. The evaluator 1102 proceeds to evaluate the next rule.
Once all rules in a checkpoint are evaluated, the evaluator 1102 proceeds with the next checkpoint until done. The evaluator 1102 then invokes 1220 the distribution engine 230 and passes the action list to it for handling.
Referring to FIG. 4A, bypass role processing 406 is handled by a set of rules, each of which define a bypass role in the antecedent, and a release action as the consequent. These rules are stored in a primary checkpoint which is evaluated (1202) as the first checkpoint during rule processing by the evaluator 1102.
The operation of the rule engine 210 is equally applicable to data objects other than e-mail messages, with the rule engine 210 and its components obtaining the appropriate attributes of a data object for applying a business rule thereto.
Action List Processing
Once the evaluator 1102 completes evaluation of a message with respect to the rule base 270, and invokes the distribution engine 230, the distribution engine 230 completes the processing by applying the actions in the action list to the message. Referring now to FIG. 13 there is shown a flow diagram of the operation of the distribution engine 230 in processing messages.
The distribution engine 230 receives the action list and message from the rule engine 210. For each action in the action list (1302) the distribution engine 230 determines 1304 the priority of the action Priority information is held in a separate priority object; each action has a default priority level which may be adjusted by the administrator. The default priority levels (highest to lowest) for actions are ordered follows: Gate, Return, Forward, Copy, Delete, Release. The distribution engine 230 calls the priority object, passing the action from the action list, and obtains the priority level for the action.
The distribution engine 230 also maintains data for the current priority level, which is initially set to 0. The distribution engine 230 compares 1306 the current priority level with the action's priority level. If the action priority is higher than the current priority, the distribution engine 230 updates 1308 the current priority with the action priority, and continues with the next action. If the current priority is higher, then the distribution engine 230 simply continues.
This process identifies the highest priority action or actions to be executed. Lower priority actions will not be executed. For example, if the highest priority action is to delete the message, then the lower priority release action will not be executed. Similarly, if the highest priority action is to gate the message, then there is no reason to copy the message. Accordingly, the distribution engine 230 deletes 1310 all actions with lower priority than the current priority level.
The distribution engine 230 then executes 1312 the remaining actions in the action list, in order.
If the action is "release," the distribution engine 230 releases 1314 the message, sending it to the next distribution point for delivery to its specified recipients. It is still possible that the message will not be delivered to such recipients because it may be gated by another REPO 102 or GPO 106 within the system. The distribution engine 230 then continue 1312 with the next action in the action list.
If the action is "delete", the distribution engine 230 deletes 1316 the message, clears the action list and continues.
If the action is "return", the distribution engine 230 returns 1318 the message to its sender, clears the action list, and continues.
If the action is "forward", the distribution engine 230 forwards 1319 the message to recipients specified in the action for the applicable rule, clears the action list, and continues.
If the action is "copy", the distribution engine 230 copies 1320 the message, and then releases the message for distribution.
Finally, if the action is "gate", the distribution engine 230 first wraps 1324 the message object and the action list into a wrapped message. A wrapped message is a special type of message within the system. FIG. 14 illustrates the structure of a wrapped message 1402. The wrapped message 1402 contains a distribution list 1414 of all the GPOs 106 that are to review the message based on the rules that fired. This distribution information is encoded in the action list, since each gate action includes the address of the gatekeeper and GPO 106 that is to receive the gated message. The last addressee on this distribution list 1414 is the REPO 102 (or GPO 106) that is sending the message for gating. The distribution engine 230 extracts this distribution information from the action list and stores it in the distribution list 1414. The usefulness of placing the REPO 102 last on the distribution list 1414 is explained further below.
The wrapped message 1402 also contains a rule history 1416 of the reasons why the message was removed from the normal distribution stream. Each rule is identified by a rule ID and a timestamp indicating when the rule was fired. This information is used by the GKI 107 to inform the gatekeeper of the reasons the message was gated.
The wrapped message 1402 contains flags 1404 indicating the status of the message. The wrapped message contains a flag that indicates that the message should be delivered unabated from this point forward to the designated GPO 106. This allows the message to be immediately delivered to the GPO 106 without further processing.
Finally, the wrapped message 1402 includes the original message data 1406, including its header 1408, body 1410, and any attachments 1412.
The flags 1404, distribution list 1414 and rule history 1416 are preferably encoded after the message data 1406; in this manner these portions of the wrapped message are ignored by conventional post offices, which deliver the message in a conventional fashion. Only a REPO 102 or GPO 106 programmed in accordance with the present invention processes this wrapper information.
Accordingly, after constructing the wrapped message 1402, the distribution engine 230 distributes 1326 it to the first GPO 106 on the distribution list 1414.
As noted above, the REPO 102 may itself receive messages from other REPOs 102. If these messages are wrapped messages, then they have already been gated and need not be reviewed by the rule engine 210 of the recipient REPO 102. The flag information in the wrapped messages indicates this status to the receipt engine 200. The receipt engine 200 provides the wrapped message directly to the distribution engine 230, which exports an interface for directly releasing a message.
VII. Gatekeeping at a Gatekeeping Post Office
Configuring the GPO
Referring now to FIG. 15 there is shown a flow chart of the process of configuring a GPO 106. In one embodiment, a GPO 106 is configured with the GKADMIN 108, instead of from within the executable of the GPO 106 itself. This lets an administrator easily configure any number of GPOs 106 on the network, without having to load and execute each one individually, which may not always be possible, since some GPOs 106 will execute on remote computers from the one being used by the administrator.
Configuration generally begins with designating 1502 a post office as a GPO 106. Any REPO 102 may be designated as a GPO 106, and operate accordingly. This results in enabling the extended functionality of the GPO 106. For the purposes of this disclosure, the REPO 102 becomes a GPO 106 when so configured. The approach provides considerable flexibility to the administrator in configuring the mail system, depending on the performance, server loads, and other considerations. FIG. 16 illustrates a user interface 1600 from the GKADMIN 108 for designating a post office as a GPO 106. The administrator checks the "Receives Gated Messages" box 1602 to designate a REPO 102 as being a GPO 106. In addition, at any time a GPO 106 may be changed back to a REPO 102, so that it no longer provides gatekeeping functionality.
The administrator then specifies 1504 an interval time parameter and an optional time out action: for example, as illustrated in FIG. 16, fields 1604 and 1606 respectively, are the parameters associated with the gatekeeper's inbox in the GPO 106. The interval time parameter is the number of minutes, hours, days, or other interval of time for which gated messages are left in the inbox to allow the gatekeeper to manually review the messages. This time value is added to the timestamp of each gated message as it is received at the GPO 106 to produce an expiration date for the message. As described above, the expiration date is then used by the GPO 106 to automatically initiate a further action to be applied to the message. The optional time out action may be used to specify the action to be applied to all expired messages, rather than individual actions as would be applied from the business rules in the gatekeeping rule base 289.
The administrator also designates 1506 gatekeeper roles. These roles are used to determine which members of the organization will have access to gated messages for further evaluation and disposition. FIG. 17 illustrates a sample user interface 1700 of the GKADMIN 108 for designating gatekeeper roles. An organizational role 1702 is selected, and associated with a gatekeeper role 1704. The roles used for assignment are stored in the organizational database 111. The GKADMIN 108 creates a separate table of gatekeeper roles and stores this with the GPO 106 being configured.
Receiving Messages
FIG. 18 illustrates the operation of the receipt engine 282 for receiving messages, when a GPO 106 also includes rule processing functionality for handling non-gated messages. The gatekeeping rule engine 283 operates to receive 1802 both conventional and gated (wrapped) messages from either conventional post offices, other GPOs 106, or REPOs 102, and processes these messages accordingly for handling by a gatekeeper (gated messages) or the distribution engine 284 (non-gated messages). The low level operation of the receipt engine 282 for setting up and receiving a message is essentially the same as described above. The receipt engine 282 differs in that it performs additional processing on a gated message.
The receipt engine 282 determines 1804 if the message is a gated message by whether it contains the additional wrapper information of the distribution list, flags, and rule history information. If the message is a gated message, then the receipt engine 282 provides 1810 the gated message to the inbox of the gatekeeper to whom the message is addressed. This gatekeeper can then review the gated message at a later point in time. The receipt engine 282 updates the gatekeeping message index 287, including storing in the gatekeeping message index 287 the expiration date for the message, based on the timestamp of the message and upon the interval time parameter of that particular gatekeeper's inbox.
If the message is not gated and hence not wrapped, then the receipt engine 282 sends 1806 the message to the regular message index 240 for indexing and storage, and then invokes 1808 the rule engine 210 to process the message in the same manner as described above, using the rule base 270. In this manner, wrapped (gated) messages are specifically diverted from further rule processing at this stage, but rather, stored in the inbox of the gatekeeper until such time as they are manually or automatically reviewed.
Manual Review of Gated Messages
Each GPO 106 provides for manual review of messages by one or more persons having been designated the role of gatekeepers. At each GPO 106 there may be any number of assigned gatekeeper administrators (individuals responsible for reviewing gated messages). When a REPO 102 sends a gated message, the rule that fires indicates which gatekeeper is to review the message. The distribution engine 230 of the REPO 102 sends the message to the GPO 106 associated with the designated gatekeeper. As noted above, such a gated message is placed in the inbox of the gatekeeper for review.
In one embodiment, the gatekeeper accesses gated messages through a separate utility program, the GKI 107, operates like a mail client, but includes additional functionality. Access through a separate utility program is desirable because the gatekeeper can thereby access any number of GPOs 106 for performing manual review of gated messages, instead of having to execute built-in functionality of each GPO 106.
When the gatekeeper accesses a message in the inbox, the GKI 107 automatically unwraps the message and provides the wrapper information to the gatekeeper. This wrapper information tells the gatekeeper the rule history indicating which rules fired and hence the reason the message was gated, and the particular routing history for the message.
FIG. 19 illustrates a sample user interface of the GKI 107, the main gatekeeper screen 1901. When a gatekeeper logs into a GPO 106, she identifies which gatekeeper role she has; the GKI 107 then displays in the gatekeeper screen 1901 the messages 1916 that have been gated to that gatekeeper. For each message, there is shown the sender, location, and the subject line of the message. In addition, a status value 1903 informs the gatekeeper whether the message has only been gated, or reviewed. The reason 1905 that the message has been gate is also shown, extracted from the rule history information in the wrapper of the message.
The main gatekeeper screen 1901 also displays a list of the mailbag folders that have been defined by the gatekeeper.
From the GKI 107, the gatekeeper can release 1909, return 1911, forward 1913, or file 1915 any message, by selection of the appropriate button.
The GKI 107 also provides the gatekeeper the ability to read and edit individual messages. To review a message, the gatekeeper selects the message and clicks on the review button 1907. FIG. 20 illustrates a sample screen for reviewing messages. This screen 2001 includes specific fields identifying the sender, specified recipients, subject line, creation and arrival dates. In addition, there is shown the reason 2003 the message was gated, the release date 2005 of the message (which is its expiration date as determined when the message was placed in the inbox), and its retain date 2007, if any. The retain date 2007 is the date after which the GPO 106 will delete the message from the inbox. These dates may be manually changed by the gatekeeper. The gatekeeper can edit the text of the message in the text field 2009, for example to remove offensive language, or confidential information.
The gatekeeper can immediately release 2011, return 2013, or forward 2015 a gated message. Forwarding a gated message enables the gatekeeper to send the message to another gatekeeper for additional review, as described above with respect to FIG. 4B; an additional screen is displayed (not shown) into which the gatekeeper can add instructions or information for the next gatekeeper. Forwarding a gated message also enables the gatekeeper to send the message to recipient(s) other than the specified recipient(s) for further processing and disposition.
FIG. 21 illustrates a screen 2100 used by a gatekeeper when returning a 8 message to the sender. When returning a message, the gatekeeper can also include in text field 2101 an explanation to the sender of why the message was not delivered. The gatekeeper may also move a message to a mailbag folder.
In one embodiment, when the gatekeeper moves a message from the inbox to one of the mailbags, the expiration date of the message is updated according to the time parameter of the selected mailbag. In this manner, all messages associated with a specific mailbag have the same expiration date. For example, a gatekeeper's inbox may have a interval time parameter of 10 days, the gatekeeper has set the time parameter for a delete mailbag at 30 days, and the last date the mailbag contents were deleted was Jan. 5, 1997. Assume that a message is received with a timestamp of Jan. 1, 1998. When the message is indexed and placed in the inbox of the gatekeeper, the gatekeeping message index 287 is updated with an expiration date for the message of Jan. 11, 1998. Now, assume that on Jan. 6, 1998 the gatekeeper manually reviews the message and decides to move it to the delete mailbag. The expiration date of the message is automatically reset to Feb. 5, 1998, or 30 days after the last delete. This date will be the expiration date for all messages moved to this mailbag, up until Feb. 6, 1998, when the expiration date will be advanced to Mar. 5, 1998.
Automated Review of Gated Messages
Automated review of gated messages is applied to those messages in the inbox of each gatekeeper which have not been manually reviewed prior to their individual expiration dates. The automated review of messages is provided by additional functionality of the GPO 106, such as part of the program executive. Automated review applies the rules defined by the gatekeeper in the gatekeeping rule base 289 to each expired message in the inbox. Each gatekeeper can write their own rules in the gatekeeping rule base 289 for handling these gated messages, and can apply more detailed analysis and handling of gated messages. Each gatekeeper defines rules for the gatekeeping rule base 289 in the same manner as described above for the rule base 270.
While the functional operation of the rule engine 283 is the same as with the rule engine 210 of a REPO 102, because the rules written by a gatekeeper may be different from the rules at a REPO 102, a given message may be handled in a different manner. Whereas the checkpoints of the REPO 102 are intended to operate on messages that are being rule processed for the first time, the rules of the gatekeeping rule base 289 are used to apply additional, and if necessary, more detailed review of the gated messages. More particularly, these rules can process the messages on the rule history information itself, in addition to all of the other properties and attributes used in the REPOs. This allows for very detailed rules to be applied to gated messages.
For example, if a REPO 102 gates messages greater than 1 Mb, then the gatekeeping rule base 289 rules can check the role of the sender and release the message for certain senders only, deleting the messages from all other senders.
The rule structure is applicable as before, with rules having both antecedent and consequent components. The rule actions include the gate, delete, release, and return actions described above.
In addition, a review action, and mailbag actions are provided for rules at the gatekeeping rule base 289. A review action specifies that the message is to be manually reviewed by a gatekeeper. During such review the gatekeeper administrator can edit the message. When a rule with a review action is fired, then the rule engine 283 moves the message to a review mailbag by updating the folder association for the message in the gatekeeping message index 287. This review action is useful because it helps the gatekeeper identify messages which need to be specifically reviewed, and which the gatekeeper did not previously consider or attempt to review (since the message was automatically reviewed due to it expiring).
Whereas the actions applied by the rules at the REPO 102 are effectively applied immediately, the actions available at the GPO 106 include actions for moving the message into one of the mailbags for delayed, periodic execution of the action for the mailbag. A mailbag action takes as an argument the name of one of the mailbags in the master folder table 290. The message is then associated with the specified mailbag in the gatekeeping message index 287. The message will be acted upon according to the appropriate action for the mailbag when the time parameters of the specified mailbag are satisfied. For example, a rule may move a message into a mailbag with a retain date set for the end of the current month, at which time the message is deleted with other messages in the folder.
Referring now to FIG. 22 there is shown a flow graph of the operation of the GPO in providing automatic review of messages. The GPO 106 periodically awakens the distribution engine 284 as a daemon process to process messages that have indexed in the inbox of each gatekeeper. For each message in the inbox (2202), the distribution engine 284 determines 2204 whether the message is expired, that is whether the current date is equal to, or greater than the expiration date. If the message is not expired, the distribution engine 284 continues with the next message in the inbox.
If the message is expired, then the distribution engine 284 invokes 2206 the rule engine 283 to apply the rules from the gatekeeping rule base 289 to the message. These rules are applied by the rule engine 283 as described above until one of the rules fires, or all rules are applied. As described above, the rule engine 283 returns an action list to the distribution engine 284 for the message. This action list identifies the action to be taken upon the message. Generally, the distribution engine 284 updates 2208 the gatekeeping message index 287 to indicate the specific action taken for the message. The distribution engine 284 then updates 2210 the distribution list, routing history, and rewraps the message, if necessary (some actions, such as delete, do not need the message to be rewrapped). The distribution engine 284 then continues with the next message. More specifically then, the distribution engine 284 handles the actions as follows:
On a return action, the distribution engine 284 updates the gatekeeping message index 287 to indicate that the message is being returned. The distribution engine 284 rewraps the message with updated history information, to indicate both that the message has been handled by this gatekeeper (storing the gatekeeper id in the wrapper) and to indicate the action taken. The distribution engine 284 continues with the next message.
On a delete action, the distribution engine 284 updates the gatekeeping message index 287 to indicate that the message is being deleted. There is no need to rewrap the message. The message is then deleted. The distribution engine 284 continues with the next message.
On a forward action, the distribution engine 284 updates the gatekeeping message index 287 to indicate that the message is released. The message is rewrapped with the gatekeeper ID and action taken (here forward and the reasons). The distribution list is updated to place the GPO 106 of the new recipient as the next GPO 106 on the list; the current GPO 106 is added at the end of the distribution list. The new recipient may be another gatekeeper, or it may be any other recipient to whom it is useful to send the message for further processing and response. The distribution engine 284 then sends the message to the next GPO on the distribution list. The distribution engine 284 continues with the next message.
On a release action, the distribution engine 284 updates the gatekeeping message index 287 to indicate that the message is released. The distribution engine 284 rewraps the message with the updated routing history so that the current gatekeeper, which is the first one on the routing history list, becomes a past gatekeeper. The next gatekeeper on the routing list is copied to the recipient list for the message. This enables the message to be routed to another gatekeeper, if there is one. This will happen when the original REPO that gated the message indicated that more then one gatekeeper was to review the message. In this case, after the present gatekeeper is done, the recipient list is updated so that the next gatekeeper may receive the message for review.
On a review action, the distribution engine 284 updates the gatekeeping message index 287 to place the message in the review mailbag for subsequent review by the gatekeeper.
As noted, an action for a message may be a mailbag action, which is to move the message to a particular mailbag. Here, the distribution engine 284 updates the gatekeeping message index 287 with an ID of the mailbag (as taken from the action). The distribution engine 284 checks whether the time parameter for the designated mailbag has expired. If so then, the distribution engine 284 performs the function associated with the mailbag, whether to release, delete, forward or so forth, the messages in the mailbag.
Distributed Gatekeeping
A release action allows a message to continue from the GPO 106 unabated by any further rule processing by another other REPO 102 or GPO 106. Once released, the message is sent to the next GPO 106, if any on the distribution list are included in the wrapper. This allows for continued handling according to the original REPO 102 rules. Each GPO 106 tags the message with its ID indicating that it has reviewed the message.
Once the last GPO 106 processes the message, the last item on the distribution list is the original REPO 102; this data item was placed in the wrapper by the distribution engine 230 of the original REPO 102. Thus, the message is returned to the REPO 102 for further distribution. The next distribution destination may be to another GPO 106 in the network which will apply its own rules. This feature enables very complex rule processing, and fully distributed and independent rule handling by any number of different GPOs 106.
When the original REPO 102 gets the message back, it reprocesses the message and applies its rule from the rule base 270 again. The list of gatekeepers in the wrapper who have reviewed the message is an "innoculant," and is used to prevent the REPO 102 from re-gating the message back to one of these gatekeepers, though the message may be gated to another gatekeeper at the same GPO 106. The REPO 102 compares the list of gatekeepers who have seen the message, with the resulting list of gatekeepers from the new rule firing. If there is a match, then the message is not sent to the matching gatekeeper because that gatekeeper has already reviewed the message once before. In this manner, the message is gated only to gatekeepers who have not yet reviewed the message. Reprocessing the message in this manner is desirable because there may have been changes in the rules of the original REPO 102 during the time period the message was being evaluated at the various GPOs 106, but it is assumed that a gatekeeper who has once reviewed a message need not review it again.
In summary, the present invention, in its various embodiments, provides a system, method, and various software products for controlling the distribution of data objects, including e-mail messages, on a communication network. The present invention applies business rules which can implement corporate communication policies, to such data objects as they are transferred through a post office or similar mail transfer agent. The business rules that are satisfied by the properties and attributes of a data object generate a set of actions to be applied to the data object. These actions are applied to the data object. The data object may be gated such that it is not delivered to its specified recipients, but rather to a gatekeeper who may manually review the message, or may allow it to be further reviewed automatically by yet another set of business rules. In this manner, fully distributed gatekeeping of any and all messages and data objects can be enforced in a networked environment.

Claims (26)

We claim:
1. A post office for receiving and redistributing e-mail messages on a computer network, the post office comprising:
a receipt mechanism that receives an e-mail message from a sender, the e-mail message having at least one specified recipient;
a database of business rules, each business rule specifying an action for controlling the delivery of an e-mail message as a function of an attribute of the e-mail message;
a rule engine coupled to receive an e-mail message from the receipt mechanism and coupled to the database to selectively apply the business rules to the e-mail message to determine from selected ones of the business rules a set of actions to be applied to the e-mail message; and
a distribution mechanism coupled to receive the set of actions from the rule engine and apply at least one action thereof to the e-mail message to control delivery of the e-mail message and which in response to the rule engine applying an action of deferring delivery of the e-mail message, the distribution engine automatically combines the e-mail message with a new distribution list specifying at least one destination post office for receiving the e-mail message for review by an administrator associated with the destination post office, and a rule history specifying the business rules that were determined to be applicable to the e-mail message by at least one rule engine, and automatically delivers the e-mail message to a first destination post office on the distribution list instead of a specified recipient of the e-mail message.
2. The post office of claim 1, wherein the actions are selected from a group comprising:
deleting an e-mail message instead of delivering the e-mail message to a specified recipient;
delivering the e-mail message to a recipient other than a specified recipient;
returning the e-mail message to the sender; and,
deferring delivery of the e-mail message to a later time.
3. The post office of claim 1, wherein, each business rule includes at least one antecedent, each antecedent defining an attribute, an operator, and value, wherein the attributes are selected from a group including:
a number of attachments;
a size of attachments; and
a text of the message.
4. The post office of claim 1, wherein, each business rule includes at least one antecedent, each antecedent defining an attribute, an operator, and value, wherein the attribute is determined by statistical performance data of the post office.
5. A post office for receiving and redistributing e-mail messages on a computer network, the post office comprising:
a data base storing an organizational hierarchy of the business, the hierarchy including a plurality of roles, each role associated with a user;
a receipt mechanism that receives an e-mail message from a sender, each e-mail message having at least one user specified as a recipient;
a database of business rules, each business rule specifying an action for controlling the delivery of an e-mail message as a function of an attribute of the e-mail message, wherein at least one business rule defines an action for prohibiting or deferring delivery of an e-mail message based upon a role of a recipient user in the organizational hierarchy;
a rule engine coupled to receive an e-mail message from the receipt mechanism and to the data base to selectively apply the business rules to the e-mail message to determine from selected ones of the business rules a set of actions to be applied to the e-mail message; and
a distribution mechanism coupled to receive the set of actions from the rule engine and apply at least one action thereof to the e-mail message to control delivery of the e-mail message.
6. The post office of claim 1, further comprising:
a primary message store, coupled to the receipt engine, for receiving and non-persistently storing e-mail messages; and
a secondary message store, accessible to the distribution engine, for receiving therefrom, and persistently storing an e-mail message in response to the rule engine determining that the e-mail message satisfied a business rule requiring the e-mail message to be reviewed by a recipient other than a recipient specified by a sender of the e-mail message.
7. The post office of claim 1, further comprising:
a primary message store, coupled to the receipt engine, for receiving and non-persistently storing e-mail messages; and
a secondary message store, coupled to the distribution engine, for receiving therefrom, and persistently storing an e-mail message in response to the rule engine specifying the action that the e-mail message be reviewed by an administrator recipient prior to delivery to a specified recipient.
8. The post office of claim 1, wherein an e-mail message includes at least one specified recipient, and the distribution engine delivers the e-mail message to a non-specified recipient prior to delivery to a specified recipient.
9. The post office of claim 1, wherein:
the rule engine specifies an action of deleting the e-mail message; and
the distribution engine automatically deletes the e-mail message, without delivering the e-mail message to any of its specified recipients.
10. The post office of claim 1, wherein:
the rule engine specifies an action of copying the e-mail message; and
the distribution engine automatically copies the e-mail message, and delivers the copy of the e-mail message to a recipient other than a specified recipient.
11. The post office of claim 1, wherein:
the rule engine specifies an action of returning the e-mail message; and
the distribution engine automatically returns the e-mail message to a sender, and does not deliver.the e-mail message to any of its specified recipients.
12. The post office of claim 1, wherein:
the rule engine specifies an action of deferring the e-mail message; and
the distribution engine persistently stores the e-mail message in a storage area for subsequent review by an administrator, and does not deliver the e-mail message to any of the specified recipients.
13. The post office of claim 1, wherein each action has a priority, and the distribution engine executes a highest priority action for each e-mail message.
14. The post office of claim 13, wherein a highest priority is assigned to an action of gating an e-mail message to a recipient other than a specified recipient.
15. An e-mail system comprising:
a first post office operating on a first computer;
a second post office, operating on a second computer, the second post office comprising:
a receipt mechanism for receiving e-mail messages from a plurality of clients, each e-mail message having at least one specified recipient;
a database of business rules, each business rule specifying an action for controlling delivery of an e-mail message;
a rule engine coupled to receive an e-mail message from the receipt mechanism and selectively applying the business rules to the e-mail message to determine a set of actions to be applied to the e-mail message to control delivery of the e-mail message, the rule engine specifying for at least one e-mail message an action of deferring delivery of the message to its specified recipients by delivering the message to an administrator associated with the first post office;
a distribution mechanism coupled to receive the at least one action from the rule engine and which in response to the rule engine applying the action of deferring delivery of the e-mail message, the distribution mechanism automatically combines the e-mail message with a new distribution list specifying at least the first post office for receiving the e-mail message for review by the administrator associated with the first post office, and a rule history specifying at least one business rule determined to be applicable to the e-mail message by at least one rule engine, and automatically delivers the e-mail message to the first post office on the distribution list instead of a specified recipient of the e-mail message.
16. The e-mail system of claim 15, further comprising:
an administration application, communicatively coupled to the first post office, for reviewing e-mail messages delivered to the administrator.
17. A process for controlling the delivery of e-mail message in a business, comprising:
providing to a post office a set of business rules derived from business communication policies, each business rule defining an action applied to an e-mail message based on the attribute of the message;
receiving messages at the post office;
to at least one message received at the post office, applying the business rules to the attributes of the message to determine at least one action of deferring delivery to be applied to the message;
automatically combining the e-mail message with a new distribution list specifying at least one destination post office for receiving the e-mail message for review by an administrator associated with the destination post office and a rule history specifying at least one business rule determined to be applicable to the e-mail message; and
automatically delivering the e-mail message to a destination post office on the distribution list instead of a specified recipient of the e-mail message.
18. A computer implemented process for deferring the delivery of an e-mail message, comprising:
storing a database including an organizational hierarcy of a business, the hierarchy including a plurality of roles, each role associated with a user;
storing a database of business rules, each business rule specifying an action for controlling the delivery of an e-mail message as a function of an attribute of the e-mail message, wherein at least one business rule defines an action for deferring delivery of an e-mail message based upon a role of a recipient user in the organizational hierarchy;
receiving the e-mail message at a post office, the e-mail having at least one specified recipient, the at least one specified recipient having a role; and
applying the business rules to the e-mail message, including responsive to the role of the at least one specified recipient deferring the e-mail message by delivering the e-mail message to an administrator to review the e-mail message prior to any delivery of the e-mail message to the at least one specified recipient.
19. The process of claim 18, further comprising:
receiving a command from the administrator specifying an action to be applied to the e-mail message, the command selected from one of a group consisting of:
deleting the e-mail message instead of delivering it to its specified recipients;
copying the e-mail message and delivering the copy to a non-specified recipient; and
returning the e-mail message to its sender without delivering it to its specified recipients.
20. A computer implemented process for deferring the delivery of an e-mail message, comprising:
storing a database of business rules, each business rule specifying an action for controlling the delivery of an e-mail message as a function of an attribute of the e-mail message;
receiving the e-mail message at a post office, the e-mail message having at least one specified recipient;
deferring delivery of the e-mail message, by:
automatically combining the e-mail message with a new distribution list specifying at least one new destination post office for receiving the e-mail message for review by an administrator associated with the destination post office and a rule history specifying at least one business rule determined to be applicable to the e-mail message; and
automatically delivering the e-mail message to a first destination post office on the distribution list instead of a specified recipient of the e-mail message;
persistently storing the e-mail message at the first destination post office until the e-mail message is reviewed;
automatically reviewing the e-mail message after a specified time interval to determine an action to be applied to the e-mail message; and
automatically applying the action to the e-mail message.
21. A process for deferring the delivery of selected e-mail messages, comprising:
storing a database of business rules, each business rule specifying an action for controlling the delivery of an e-mail message as a function of an attribute of the e-mail message;
receiving a plurality of e-mail messages at a first post office, each e-mail message having at least one specified recipient;
selecting at least one e-mail message from the plurality of e-mail messages by applying at least one business rule to the e-mail message;
delivering each non-selected e-mail message to its specified recipients; and
deferring the selected e-mail message by:
automatically combining the selected e-mail message with a new distribution list specifying at least one new destination post office for receiving the e-mail message for review by an administrator associated with the destination post office and a rule history specifying at least one business rule determined to be applicable to the e-mail message;
automatically delivering the selected e-mail message to a destination post office on the distribution list instead of a specified recipient of the e-mail message;
persistently storing the selected e-mail message in a storage area of the destination post office until the selected e-mail message is reviewed prior to any further delivery of the e-mail message to its specified recipients or to another destination post office on the distribution list.
22. A computer implemented process for reviewing an e-mail message, comprising:
receiving the e-mail message at a first post office, the e-mail message having at least one specified recipient;
deferring the e-mail message by:
automatically combining the selected e-mail message with a new distribution list specifying at least one second post office for receiving the e-mail message for review by an administrator associated with the second post office and a rule history specifying at least one business rule determined to be applicable to the e-mail message; and
automatically delivering the selected e-mail message to an administrator at the second post office on the distribution list instead of a specified recipient of the e-mail message;
persistently storing the e-mail message at the second post office until the e-mail message is reviewed;
automatically reviewing the e-mail message after a specified time interval to determine an action to be applied to the e-mail message; and
automatically applying the action to the e-mail message.
23. A computer implemented process for reviewing an e-mail message, each e-mail message having at least one specified recipient, the process comprising:
storing a database of business rules, each business rule specifying an action for controlling the delivery of an e-mail message as a function of an attribute of the e-mail message;
automatically combining e-mail message with a distribution list specifying at least one destination post office for receiving the e-mail message for review by an administrator associated with the destination post office, and a rule history specifying at least one business rule determined to be applicable to the e-mail message;
automatically delivering the selected e-mail message to an administrator at a destination post office on the distribution list instead of a specified recipient of the e-mail message;
persistently storing the e-mail message delivered to the administrator in a message store until the e-mail message is reviewed, each e-mail message in the message store having an expiration date;
receiving for at least one of the persistently stored e-mail message, a command from the administrator prior to the expiration date of the e-mail message, the command indicating an action to be applied to the e-mail message, and applying the action to the e-mail message; and
for each e-mail message for which a command is not received from the administrator prior to the expiration date of the e-mail message, automatically determining an action to be applied to the message by applying at least one business rule to the e-mail message, and applying the action to the e-mail message.
24. A post office for receiving and redistributing data objects on a computer network, the post office comprising:
a receipt mechanism that receives a data object from a sender, the data object having at least one specified recipient;
a database of business rules, each business rule specifying an action for controlling the delivery of a data object as a function of an attribute of the data object;
a rule engine coupled to receive a data object from the receipt mechanism and coupled to the database to selectively apply the business rules to the data object to determine from selected ones of the business rules a set of actions to be applied to the data object; and
a distribution mechanism coupled to receive the set of actions from the rule engine and apply at least one action thereof to the data object to control delivery of the data object and which in response to the rule engine applying an action of deferring delivery of the data object, the distribution engine automatically combines the data object with a new distribution list specifying at least one new destination post office for receiving the data object for review by an administrator associated with the destination post office and a rule history specifying at least one business rule determined to be applicable to the data object by at least one rule engine, and automatically delivers the data object to a first destination post office on the distribution list instead of a specified recipient of the data object.
25. A computer implemented process for deferring the delivery of a data object, comprising:
storing a database including an organizational hierarchy of a business, the hierarchy including a plurality of roles, each role associated with a user;
storing a database of business rules, each business rule specifying an action for controlling the delivery of a data object as a function of an attribute of the data object, wherein at least one business rule defines an action for deferring delivery of a data object based upon a role of a recipient user in the organizational hierarchy;
receiving the data object at a post office, the data object having at least one specified recipient, the at least one specified recipient having a role;
applying the business rules to the data object, including responsive to the role of the recipient deferring delivery of the data object by delivering the data object to a recipient other than a specified recipient;
persistently storing the data object until the data object is reviewed;
automatically reviewing the data object after a specified time interval to determine an action to be applied to the data object; and
automatically applying the action to the data object.
26. A process for deferring the delivery of selected data objects, comprising:
storing a database of business rules, each business rule specifying an action for controlling the delivery of a data object as a function of an attribute of the data object;
receiving a plurality of data objects at a first post office, each data object having at least one specified recipient;
selecting at least one data object from the plurality of data objects by applying at least one business rule to the data object;
delivering each non-selected data object to its specified recipients;
deferring the selected data object by:
automatically combining the selected data object with a new distribution list specifying at least one new destination post office for receiving the data object for review by an administrator associated with the destination post office; and a rule history specifying at least one business rule determined to be applicable to the data object;
automatically delivering the selected data object to a destination post office on the distribution list instead of a specified recipient of the data object; and
persistently storing the data object in a storage area until the data object is reviewed prior to any further delivery of the data object to its specified recipients.
US08/881,034 1997-06-23 1997-06-23 Automated post office based rule analysis of e-mail messages and other data objects for controlled distribution in network environments Expired - Lifetime US6073142A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US08/881,034 US6073142A (en) 1997-06-23 1997-06-23 Automated post office based rule analysis of e-mail messages and other data objects for controlled distribution in network environments

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US08/881,034 US6073142A (en) 1997-06-23 1997-06-23 Automated post office based rule analysis of e-mail messages and other data objects for controlled distribution in network environments

Publications (1)

Publication Number Publication Date
US6073142A true US6073142A (en) 2000-06-06

Family

ID=25377654

Family Applications (1)

Application Number Title Priority Date Filing Date
US08/881,034 Expired - Lifetime US6073142A (en) 1997-06-23 1997-06-23 Automated post office based rule analysis of e-mail messages and other data objects for controlled distribution in network environments

Country Status (1)

Country Link
US (1) US6073142A (en)

Cited By (693)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000057285A1 (en) * 1999-03-19 2000-09-28 Zairmail, Inc. Distributed system for conducting physical delivery mail service over the internet
WO2001016695A1 (en) * 1999-09-01 2001-03-08 Katsikas Peter L System for eliminating unauthorized electronic mail
US6226630B1 (en) * 1998-07-22 2001-05-01 Compaq Computer Corporation Method and apparatus for filtering incoming information using a search engine and stored queries defining user folders
US6275850B1 (en) * 1998-07-24 2001-08-14 Siemens Information And Communication Networks, Inc. Method and system for management of message attachments
US20010029499A1 (en) * 1999-12-30 2001-10-11 Tuatini Jeffrey Taihana Rules processing system
US6317751B1 (en) * 1998-09-28 2001-11-13 Merrill Lynch & Co., Inc. Compliance archival data process and system
US6334140B1 (en) * 1997-09-25 2001-12-25 Nec Corporation Electronic mail server in which electronic mail is processed
WO2002008938A2 (en) * 2000-07-24 2002-01-31 Vignette Corporation Method and system for managing message pacing
WO2002013489A2 (en) * 2000-08-08 2002-02-14 Tumbleweed Communications Corp. Recipient-specified automated processing in a secure data file delivery system
US20020019932A1 (en) * 1999-06-10 2002-02-14 Eng-Whatt Toh Cryptographically secure network
US20020026485A1 (en) * 2000-07-26 2002-02-28 Kazuhiro Sugawara Communicating apparatus and communicating method
WO2002019146A1 (en) * 2000-08-28 2002-03-07 Brown Scott T E-mail messaging system and method for enhanced rich media delivery
EP1193925A2 (en) * 2000-09-21 2002-04-03 Siemens Information and Communication Networks Inc. Processing electronic messages
US20020042815A1 (en) * 2000-09-22 2002-04-11 Arthur Salzfass Automated system and method for routing undeliverable e-mail messages and otherwise managing e-mail
US6374302B1 (en) * 1998-03-31 2002-04-16 At&T Corp. Method and system to provide an action control point master gatekeeper
US6385627B1 (en) * 1997-11-24 2002-05-07 International Business Machines Corporation Method, apparatus and computer program product for providing document user role indication
US20020065892A1 (en) * 2000-11-30 2002-05-30 Malik Dale W. Method and apparatus for minimizing storage of common attachment files in an e-mail communications server
US6411947B1 (en) * 1997-04-03 2002-06-25 Brightware Inc Automatic message interpretation and routing system
WO2002054656A2 (en) * 2001-01-05 2002-07-11 Viquity Corporation Use of time-stamps and digital signatures
US20020091774A1 (en) * 2001-01-08 2002-07-11 Kokoro Imamura Method and system for retrieving electronic mail for a plurality of users over a single device
EP1223526A1 (en) * 2001-01-10 2002-07-17 Hewlett-Packard Company, A Delaware Corporation Improved process and apparatus for email handling
US20020095464A1 (en) * 2000-12-01 2002-07-18 Meek Christopher A. Dynamic controlling of attribute-specific list for improved object organization
US6425002B1 (en) * 1998-11-23 2002-07-23 Motorola, Inc. Apparatus and method for handling dispatching messages for various applications of a communication device
US20020101998A1 (en) * 1999-06-10 2002-08-01 Chee-Hong Wong Fast escrow delivery
US20020116499A1 (en) * 2001-02-16 2002-08-22 Microsoft Corporation, Method and system for using one form to send a message using multiple transports
US20020120705A1 (en) * 2001-02-26 2002-08-29 Schiavone Vincent J. System and method for controlling distribution of network communications
US20020120600A1 (en) * 2001-02-26 2002-08-29 Schiavone Vincent J. System and method for rule-based processing of electronic mail messages
US20020129238A1 (en) * 2000-07-07 2002-09-12 Eng-Whatt Toh Secure and reliable document delivery using routing lists
US20020133624A1 (en) * 2001-01-16 2002-09-19 Tony Hashem System and process for routing information in a data processing system
US6466975B1 (en) * 1999-08-23 2002-10-15 Digital Connexxions Corp. Systems and methods for virtual population mutual relationship management using electronic computer driven networks
US20020156850A1 (en) * 2001-04-24 2002-10-24 Walter Hamscher Negotiating agreements
US20020161862A1 (en) * 2001-03-15 2002-10-31 Horvitz Eric J. System and method for identifying and establishing preferred modalities or channels for communications based on participants' preferences and contexts
US20020188687A1 (en) * 2001-06-07 2002-12-12 Acceleration Software International Corporation Dial back E-mail system using binary protocol
US20030018808A1 (en) * 2001-03-26 2003-01-23 Lev Brouk System and method for mapping of services
US20030041178A1 (en) * 2001-03-26 2003-02-27 Lev Brouk System and method for routing messages between applications
US20030053459A1 (en) * 2001-03-26 2003-03-20 Lev Brouk System and method for invocation of services
US20030097427A1 (en) * 2001-11-21 2003-05-22 Parry Travis J. Multiple device configuration and upgrade for imaging devices
US20030101065A1 (en) * 2001-11-27 2003-05-29 International Business Machines Corporation Method and apparatus for maintaining conversation threads in electronic mail
US20030110443A1 (en) * 1999-03-27 2003-06-12 Steve Yankovich Method and apparatus for programmatic learned routing in an electronic form system
US20030131063A1 (en) * 2001-12-19 2003-07-10 Breck David L. Message processor
US20030145058A1 (en) * 2002-01-29 2003-07-31 Yuan-Chau Chan System and method for managing mail and file
US20030185197A1 (en) * 2002-03-28 2003-10-02 International Business Machines Corporation System and method for redirecting network addresses for deferred rendering
US20030190909A1 (en) * 2002-04-08 2003-10-09 Akimasa Matsushita Electronic mail receipt processing method and portable communication apparatus for practicing the same
US20030191811A1 (en) * 2002-04-05 2003-10-09 Tony Hashem Method and system for transferring files using file transfer protocol
US20030191969A1 (en) * 2000-02-08 2003-10-09 Katsikas Peter L. System for eliminating unauthorized electronic mail
US20030204646A1 (en) * 2002-04-23 2003-10-30 International Business Machines Corporation Object-oriented framework for document routing service in a content management system
EP1365340A2 (en) * 2000-11-08 2003-11-26 Orchestria Limited An information management system
US6658456B1 (en) * 1997-09-29 2003-12-02 Panasonic Communications Co., Ltd. Electric mail transferring apparatus and electric mail transferring method
US20040054914A1 (en) * 2002-04-30 2004-03-18 Sullivan Patrick L. Method and apparatus for in-line serial data encryption
US6725228B1 (en) * 2000-10-31 2004-04-20 David Morley Clark System for managing and organizing stored electronic messages
US6741974B1 (en) * 2000-06-02 2004-05-25 Lockheed Martin Corporation Genetically programmed learning classifier system for complex adaptive system processing with agent-based architecture
US20040103147A1 (en) * 2001-11-13 2004-05-27 Flesher Kevin E. System for enabling collaboration and protecting sensitive data
US20040107089A1 (en) * 1998-01-27 2004-06-03 Gross John N. Email text checker system and method
US20040111639A1 (en) * 2000-02-14 2004-06-10 Schwartz Michael I. Information aggregation, processing and distribution system
US20040117765A1 (en) * 2002-12-16 2004-06-17 Ming Chan System and method for evaluating and executing hierarchies of rules
US20040128498A1 (en) * 2002-12-31 2004-07-01 Pitney Bowes Inc. System and method for message filtering by a trusted third party
US20040133699A1 (en) * 2002-12-04 2004-07-08 Tony Hashem System and method for performing data transfer
US20040148330A1 (en) * 2003-01-24 2004-07-29 Joshua Alspector Group based spam classification
EP1444612A1 (en) * 2001-11-13 2004-08-11 Lockheed Martin Corporation Information aggregation, processing and distribution system
US6778941B1 (en) * 2000-11-14 2004-08-17 Qualia Computing, Inc. Message and user attributes in a message filtering method and system
US20040160629A1 (en) * 1996-11-21 2004-08-19 Ricoh Company, Ltd Method and system for automatically and transparently archiving documents and document meta data
US20040162879A1 (en) * 2003-02-14 2004-08-19 Microsoft Corporation Method, apparatus, and user interface for managing electronic mail and alert messages
US20040167987A1 (en) * 2001-03-30 2004-08-26 Grand Central Communications, Inc. Apparatus and methods for provisioning services
US20040186891A1 (en) * 2001-03-30 2004-09-23 Grand Central Communications, Inc. Apparatus and methods for correlating messages sent between services
US20040194112A1 (en) * 2003-03-28 2004-09-30 Microsoft Corporation Entity linking system
US20040193915A1 (en) * 2000-03-31 2004-09-30 Smith Jeffrey C. Policy enforcement in a secure data file delivery system
WO2004088447A2 (en) * 2003-04-04 2004-10-14 Emedia It Cc A digital e-mail certificate
US20040205136A1 (en) * 2003-03-28 2004-10-14 Kevin Whittenberger Document message state management engine
US20040215610A1 (en) * 2003-04-22 2004-10-28 Lawson Software, Inc. System and method for extracting and applying business organization information
US20040225645A1 (en) * 2003-05-06 2004-11-11 Rowney Kevin T. Personal computing device -based mechanism to detect preselected data
US20040236839A1 (en) * 2003-05-05 2004-11-25 Mailfrontier, Inc. Message handling with selective user participation
US20050015622A1 (en) * 2003-02-14 2005-01-20 Williams John Leslie System and method for automated policy audit and remediation management
US20050021540A1 (en) * 2003-03-26 2005-01-27 Microsoft Corporation System and method for a rules based engine
US20050027723A1 (en) * 2002-09-18 2005-02-03 Chris Jones Method and apparatus to report policy violations in messages
US20050050145A1 (en) * 2003-09-03 2005-03-03 Lowe John C. Second person review of email
US20050055410A1 (en) * 2003-05-09 2005-03-10 Landsman Richard A. Managing electronic messages
US20050080914A1 (en) * 2003-10-14 2005-04-14 Grand Central Communications, Inc., A Delaware Corporation Policy management in an interoperability network
US20050086515A1 (en) * 2003-10-15 2005-04-21 Paris Clifford D. Motion detecting computer control device
US20050086297A1 (en) * 2003-10-16 2005-04-21 Grand Central Communications, Inc. Managing virtual business instances within a computer network
US20050086252A1 (en) * 2002-09-18 2005-04-21 Chris Jones Method and apparatus for creating an information security policy based on a pre-configured template
US20050138430A1 (en) * 2003-12-19 2005-06-23 Landsman Richard A. Community messaging lists for authorization to deliver electronic messages
US20050154900A1 (en) * 2004-01-13 2005-07-14 Networks Associates Technology, Inc. Detecting malicious computer program activity using external program calls with dynamic rule sets
US20050188045A1 (en) * 2000-02-08 2005-08-25 Katsikas Peter L. System for eliminating unauthorized electronic mail
US20050193063A1 (en) * 1997-10-22 2005-09-01 Cannata Michael J. Web-based groupware system
US20050193071A1 (en) * 2004-02-26 2005-09-01 Mike Hollatz Session to track actual e-mail handling time
US20050223074A1 (en) * 2004-03-31 2005-10-06 Morris Robert P System and method for providing user selectable electronic message action choices and processing
US20050223073A1 (en) * 2000-05-04 2005-10-06 Malik Dale W Attaching applets to messaging communications
US20050228679A1 (en) * 2004-04-07 2005-10-13 Alana King Automated account statement generation process
US20050228863A1 (en) * 2004-04-07 2005-10-13 Grand Central Communications, Inc. Techniques for providing interoperability as a service
US20050234928A1 (en) * 2004-03-23 2005-10-20 Grand Central Communications, Inc. Synchronous interface to asynchronous processes
US6981252B1 (en) 2000-07-14 2005-12-27 Symantec Corporation Method and apparatus for automatically uninstalling software on a network
US20060010215A1 (en) * 2004-05-29 2006-01-12 Clegg Paul J Managing connections and messages at a server by associating different actions for both different senders and different recipients
US20060026236A1 (en) * 2002-12-03 2006-02-02 Research In Motion Limited Method, system and computer software product for pre-selecting a folder for a message
US20060031359A1 (en) * 2004-05-29 2006-02-09 Clegg Paul J Managing connections, messages, and directory harvest attacks at a server
US20060031314A1 (en) * 2004-05-28 2006-02-09 Robert Brahms Techniques for determining the reputation of a message sender
US20060031225A1 (en) * 2004-08-06 2006-02-09 Grand Central Communications, Inc. Providing on-demand access to services in a wide area network
US6999993B1 (en) * 1999-12-15 2006-02-14 Microsoft Corporation Methods and systems for end-users extensible electronic mail
US20060059238A1 (en) * 2004-05-29 2006-03-16 Slater Charles S Monitoring the flow of messages received at a server
US20060069713A1 (en) * 2004-08-27 2006-03-30 Min Wei Securely and efficiently extending data processing pipeline functionality
US20060075031A1 (en) * 2004-09-17 2006-04-06 Wagner Dirk P Bounce management
US20060072400A1 (en) * 2004-09-17 2006-04-06 International Business Machines Corporation System and method for optimizing a storage system to support short data lifetimes
US20060136545A1 (en) * 2000-07-24 2006-06-22 Brian Reistad Method and system for facilitating marketing dialogues
US20060184549A1 (en) * 2005-02-14 2006-08-17 Rowney Kevin T Method and apparatus for modifying messages based on the presence of pre-selected data
US20060190481A1 (en) * 2003-01-24 2006-08-24 Aol Llc Classifier Tuning Based On Data Similarities
US20060224589A1 (en) * 2005-02-14 2006-10-05 Rowney Kevin T Method and apparatus for handling messages containing pre-selected data
US20060230117A1 (en) * 2005-04-08 2006-10-12 Cisco Technology, Inc. System and method for message prioritization
US20060242244A1 (en) * 2005-04-04 2006-10-26 Logue Jay D Federated challenge credit system
US20060253584A1 (en) * 2005-05-03 2006-11-09 Dixon Christopher J Reputation of an entity associated with a content item
US20060253583A1 (en) * 2005-05-03 2006-11-09 Dixon Christopher J Indicating website reputations based on website handling of personal information
US20060251068A1 (en) * 2002-03-08 2006-11-09 Ciphertrust, Inc. Systems and Methods for Identifying Potentially Malicious Messages
US20060253578A1 (en) * 2005-05-03 2006-11-09 Dixon Christopher J Indicating website reputations during user interactions
US20060253580A1 (en) * 2005-05-03 2006-11-09 Dixon Christopher J Website reputation product architecture
US7140035B1 (en) * 2000-02-01 2006-11-21 Teleran Technologies, Inc. Rule based security policy enforcement
US20060288047A1 (en) * 2004-09-17 2006-12-21 International Business Machines Corporation Method for bulk deletion through segmented files
US20060291580A1 (en) * 1999-06-04 2006-12-28 Microsoft Corporation System for performing context-sensitive decisions about ideal communication modalities considering information about channel reliability
US20070005983A1 (en) * 1997-07-24 2007-01-04 Dickinson Robert D Iii E-mail firewall with stored key encryption/decryption
US7171000B1 (en) 1999-06-10 2007-01-30 Message Secure Corp. Simplified addressing for private communications
US20070043733A1 (en) * 2005-08-17 2007-02-22 Cannon David M Logical grouping and management of redundant objects in storage systems
US7185332B1 (en) 1998-03-25 2007-02-27 Symantec Corporation Multi-tiered incremental software updating
WO2007027112A1 (en) * 2005-09-01 2007-03-08 Datasquirt Limited Quality assurance processing for electronic text messages
US20070073686A1 (en) * 2005-09-28 2007-03-29 Brooks David A Method and system for full text indexing optimization through identification of idle and active content
US7209953B2 (en) 2002-12-12 2007-04-24 Mark Brooks E-mail system using attachment identifier generated at issuer device for retrieving appropriate file version from e-mail's issuer
EP1783973A2 (en) * 2000-09-29 2007-05-09 Postini, Inc. Value-added electronic messaging services and transparent implementation thereof using intermediate server
US20070107059A1 (en) * 2004-12-21 2007-05-10 Mxtn, Inc. Trusted Communication Network
US20070124484A1 (en) * 2005-11-30 2007-05-31 Microsoft Corporation Retaining mail for availability after relay
US20070143824A1 (en) * 2003-12-23 2007-06-21 Majid Shahbazi System and method for enforcing a security policy on mobile devices using dynamically generated security profiles
US20070150253A1 (en) * 2005-12-28 2007-06-28 Microsoft Corporation Reviewing effectiveness of communication rules system
US20070150933A1 (en) * 2005-12-28 2007-06-28 Microsoft Corporation Combining communication policies into common rules store
US20070192490A1 (en) * 2006-02-13 2007-08-16 Minhas Sandip S Content-based filtering of electronic messages
US20070203992A1 (en) * 2006-02-28 2007-08-30 Research In Motion Limited Method, system and apparatus for partial electronic message forwarding
US20070244974A1 (en) * 2004-12-21 2007-10-18 Mxtn, Inc. Bounce Management in a Trusted Communication Network
US20070255850A1 (en) * 2006-05-01 2007-11-01 Gould Kim V W Methods and systems for data prioritization
US7308648B1 (en) * 2002-11-27 2007-12-11 Microsoft Corporation Method, system, and computer-readable medium for filtering harmful HTML in an electronic document
US20080034042A1 (en) * 2006-08-02 2008-02-07 Microsoft Corporation Access limited emm distribution lists
US20080060076A1 (en) * 2005-01-19 2008-03-06 Lockdown Networks, Inc. Network appliance for vulnerability assessment auditing over multiple networks
US20080059477A1 (en) * 2006-08-30 2008-03-06 Embarq Holdings Company Llc Method and system for tracking service orders
US20080071770A1 (en) * 2006-09-18 2008-03-20 Nokia Corporation Method, Apparatus and Computer Program Product for Viewing a Virtual Database Using Portable Devices
AU2001267199B2 (en) * 2000-06-09 2008-04-17 Open Text Sa Ulc Web-based groupware system
US20080104517A1 (en) * 2001-03-15 2008-05-01 Microsoft Corporation Representation, decision models, and user interface for encoding managing preferences, and performing automated decision making about the timing and modalities of interpersonal communications
US7373519B1 (en) 2003-04-09 2008-05-13 Symantec Corporation Distinguishing legitimate modifications from malicious modifications during executable computer file modification analysis
US20080126493A1 (en) * 2006-11-29 2008-05-29 Mcafee, Inc Scanner-driven email message decomposition
US20080126481A1 (en) * 2006-11-26 2008-05-29 Al Chakra Method and system for providing communication context specific formality control
US20080147612A1 (en) * 2006-12-19 2008-06-19 Mcafee, Inc. Known files database for malware elimination
US7398533B1 (en) * 2000-05-09 2008-07-08 Sun Microsystems, Inc. Remote function invocation with messaging in a distributed computing environment
US20080184366A1 (en) * 2004-11-05 2008-07-31 Secure Computing Corporation Reputation based message processing
US20080250112A1 (en) * 2005-11-01 2008-10-09 International Business Machine Corporation Method and Apparatus for Determining Whether an Email Message is Ready for Transmission
US20080270789A1 (en) * 2001-06-22 2008-10-30 Tumbleweed Communications Corp. Method and system for messaging security
US20080288601A1 (en) * 2003-08-14 2008-11-20 International Business Machines Corporation System and method for conditioned delivery of electronic mail
US20080301286A1 (en) * 2007-05-31 2008-12-04 Mark Cameron Little Persistent message store
US20080301707A1 (en) * 2007-05-31 2008-12-04 Mark Cameron Little Rules engine for a persistent message store
US7472114B1 (en) 2002-09-18 2008-12-30 Symantec Corporation Method and apparatus to define the scope of a search for information from a tabular data source
US20090006475A1 (en) * 2007-06-29 2009-01-01 Microsoft Corporation Collecting and Presenting Temporal-Based Action Information
US20090063648A1 (en) * 2000-05-04 2009-03-05 At&T Intellectual Property I, L.P. Viewing Attachments to Electronic Communications Via Pushing the Attachment to a Networked Viewing Site
US20090086252A1 (en) * 2007-10-01 2009-04-02 Mcafee, Inc Method and system for policy based monitoring and blocking of printing activities on local and network printers
US20090100519A1 (en) * 2007-10-16 2009-04-16 Mcafee, Inc. Installer detection and warning system and method
US20090119743A1 (en) * 2007-11-07 2009-05-07 Mcafee, Inc. Method and system for generic real time management of devices on computers connected to a network
US20090182830A1 (en) * 2003-04-18 2009-07-16 Aol Llc Sorting electronic messages using attributes of the sender address
US20090205045A1 (en) * 2008-02-12 2009-08-13 Mcafee, Inc. Bootstrap OS protection and recovery
US20090204858A1 (en) * 2006-11-27 2009-08-13 Fujitsu Limited Server management program, system, and method, and mail server management program
US20090222894A1 (en) * 2004-10-06 2009-09-03 Shane Kenny Systems and Methods for Delegation and Notification of Administration of Internet Access
US20090234708A1 (en) * 2008-03-17 2009-09-17 Heiser Ii Russel Robert Method and system for targeted content placement
US20090232300A1 (en) * 2008-03-14 2009-09-17 Mcafee, Inc. Securing data using integrated host-based data loss agent with encryption detection
US7620691B1 (en) 2003-02-10 2009-11-17 Aol Llc Filtering electronic messages while permitting delivery of solicited electronics messages
US20090292784A1 (en) * 2008-05-20 2009-11-26 Raytheon Company System and method for message filtering
US20090292785A1 (en) * 2008-05-20 2009-11-26 Raytheon Company System and method for dynamic contact lists
US20090292773A1 (en) * 2008-05-20 2009-11-26 Raytheon Company System and method for collaborative messaging and data distribution
US20090292779A1 (en) * 2008-05-22 2009-11-26 International Business Machines Corporation Method and System for Supervising Electronic Text Communications of an Enterprise
US20090292765A1 (en) * 2008-05-20 2009-11-26 Raytheon Company Method and apparatus for providing a synchronous interface for an asynchronous service
US7627635B1 (en) 2003-07-28 2009-12-01 Aol Llc Managing self-addressed electronic messages
US20090300770A1 (en) * 2002-09-18 2009-12-03 Rowney Kevin T Mechanism to search information content for preselected data
US20090313348A1 (en) * 2008-06-17 2009-12-17 Trevor Plestid Method and apparatus for remote manipulation of attachments
US7644144B1 (en) 2001-12-21 2010-01-05 Microsoft Corporation Methods, tools, and interfaces for the dynamic assignment of people to groups to enable enhanced communication and collaboration
US7647411B1 (en) 2001-02-26 2010-01-12 Symantec Corporation System and method for controlling distribution of network communications
US20100011410A1 (en) * 2008-07-10 2010-01-14 Weimin Liu System and method for data mining and security policy management
US7650383B2 (en) 2005-03-15 2010-01-19 Aol Llc Electronic message system with federation of trusted senders
US20100042931A1 (en) * 2005-05-03 2010-02-18 Christopher John Dixon Indicating website reputations during website manipulation of user information
US20100071032A1 (en) * 2005-06-30 2010-03-18 David Durham Techniques for Authenticated Posture Reporting and Associated Enforcement of Network Access
US7711716B2 (en) 2007-03-06 2010-05-04 Microsoft Corporation Optimizations for a background database consistency check
US20100115581A1 (en) * 2008-11-06 2010-05-06 Trust Digital System method and device for mediating connections between policy source servers, corporate respositories, and mobile devices
US7721328B2 (en) 2004-10-01 2010-05-18 Salesforce.Com Inc. Application identity design
US20100162347A1 (en) * 2008-12-22 2010-06-24 Ian Barile Adaptive data loss prevention policies
USRE41411E1 (en) 1997-08-26 2010-06-29 Aol Inc. Method and system for filtering electronic messages
US20100293470A1 (en) * 2009-05-12 2010-11-18 Microsoft Corporatioin Hierarchically-Organized Control Galleries
US20100294827A1 (en) * 2007-05-16 2010-11-25 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Maneuverable surgical stapler
US20100299394A1 (en) * 2009-05-20 2010-11-25 International Business Machines Corporation User-configured alternate email rendering
EP1536602A3 (en) * 2003-08-06 2010-12-01 NEC Corporation Electronic communication device, method and program for receiving email by electronic communication device
US7853563B2 (en) 2005-08-01 2010-12-14 Seven Networks, Inc. Universal data aggregation
US20100333176A1 (en) * 2005-01-26 2010-12-30 Mcafee, Inc., A Delaware Corporation Enabling Dynamic Authentication With Different Protocols on the Same Port for a Switch
US20100332481A1 (en) * 2002-09-18 2010-12-30 Rowney Kevin T Secure and scalable detection of preselected data embedded in electronically transmitted messages
US7870240B1 (en) 2002-06-28 2011-01-11 Microsoft Corporation Metadata schema for interpersonal communications management systems
US20110055381A1 (en) * 2009-09-03 2011-03-03 Mcafee, Inc. Host information collection
US20110055334A1 (en) * 2009-08-31 2011-03-03 Tivyan Roman System and method for evaluating outbound messages
US7917468B2 (en) 2005-08-01 2011-03-29 Seven Networks, Inc. Linking of personal information management data
US7917505B2 (en) 2005-08-01 2011-03-29 Seven Networks, Inc. Methods for publishing content
US7921174B1 (en) 2009-07-24 2011-04-05 Jason Adam Denise Electronic communication reminder technology
US20110093952A1 (en) * 2009-10-15 2011-04-21 Mcafee, Inc. Detecting and responding to malware using link files
US20110093842A1 (en) * 2004-09-07 2011-04-21 Mcafee, Inc., A Delaware Corporation Solidifying the executable software set of a computer
US20110093953A1 (en) * 2009-10-20 2011-04-21 Mcafee, Inc. Preventing and responding to disabling of malware protection software
US20110093694A1 (en) * 2009-10-16 2011-04-21 Mcafee, Inc. Pattern Recognition Using Transition Table Templates
US20110107424A1 (en) * 2009-11-03 2011-05-05 Mcafee, Inc. Rollback Feature
US20110131657A1 (en) * 2009-12-02 2011-06-02 Mcafee, Inc. Hooking nonexported functions by the offset of the function
US20110138461A1 (en) * 2006-03-27 2011-06-09 Mcafee, Inc., A Delaware Corporation Execution environment file inventory
US20110138273A1 (en) * 2004-08-16 2011-06-09 Microsoft Corporation Floating Command Object
US20110162049A1 (en) * 2002-08-27 2011-06-30 Mcafee, Inc., A Delaware Corporation Enterprise-wide security system for computer devices
US20110173677A1 (en) * 2002-05-10 2011-07-14 Mcafee, Inc., A Delaware Corporation Detecting malware carried by an e-mail message
US20110173342A1 (en) * 2000-06-16 2011-07-14 Mcafee, Inc. Method and apparatus for rate limiting
US20110179491A1 (en) * 2005-01-14 2011-07-21 Mcafee, Inc., A Delaware Corporation System, method and computer program product for context-driven behavioral heuristics
US20110191849A1 (en) * 2010-02-02 2011-08-04 Shankar Jayaraman System and method for risk rating and detecting redirection activities
US7996374B1 (en) 2008-03-28 2011-08-09 Symantec Corporation Method and apparatus for automatically correlating related incidents of policy violations
US7996373B1 (en) 2008-03-28 2011-08-09 Symantec Corporation Method and apparatus for detecting policy violations in a data repository having an arbitrary data schema
US20110208653A1 (en) * 2000-11-01 2011-08-25 Buyerleverage Email Solutions Llc System and method for granting deposit-contingent e-mailing rights
US20110208861A1 (en) * 2004-06-23 2011-08-25 Mcafee, Inc. Object classification in a capture system
US8010082B2 (en) 2004-10-20 2011-08-30 Seven Networks, Inc. Flexible billing architecture
US20110219424A1 (en) * 2010-03-05 2011-09-08 Microsoft Corporation Information protection using zones
US20110219081A1 (en) * 2010-03-08 2011-09-08 Microsoft Corporation Zone classification of electronic mail messages
US20110225622A1 (en) * 2010-03-12 2011-09-15 Derek Patton Pearcy System, method, and computer program product for displaying network events in terms of objects managed by a security appliance and/or a routing device
US20110225635A1 (en) * 2007-06-29 2011-09-15 Rishi Kumar Non-obtrusive security system for devices
US8065739B1 (en) 2008-03-28 2011-11-22 Symantec Corporation Detecting policy violations in information content containing data in a character-based language
US8064583B1 (en) 2005-04-21 2011-11-22 Seven Networks, Inc. Multiple data store authentication
US20110289072A1 (en) * 2010-05-24 2011-11-24 Microsoft Corporation Search-based system management
US8069166B2 (en) 2005-08-01 2011-11-29 Seven Networks, Inc. Managing user-to-user contact with inferred presence information
US8078158B2 (en) 2008-06-26 2011-12-13 Seven Networks, Inc. Provisioning applications for a mobile device
US8107921B2 (en) 2008-01-11 2012-01-31 Seven Networks, Inc. Mobile virtual network operator
US8116214B2 (en) 2004-12-03 2012-02-14 Seven Networks, Inc. Provisioning of e-mail settings for a mobile terminal
US8117542B2 (en) 2004-08-16 2012-02-14 Microsoft Corporation User interface for displaying selectable software functionality controls that are contextually relevant to a selected object
US8127342B2 (en) 2002-01-08 2012-02-28 Seven Networks, Inc. Secure end-to-end transport through intermediary nodes
US8131848B1 (en) 2009-09-29 2012-03-06 Jason Adam Denise Image analysis and communication device control technology
US8146016B2 (en) 2004-08-16 2012-03-27 Microsoft Corporation User interface for displaying a gallery of formatting options applicable to a selected object
US8166164B1 (en) 2010-11-01 2012-04-24 Seven Networks, Inc. Application and network-based long poll request detection and cacheability assessment therefor
US20120110104A1 (en) * 2000-12-29 2012-05-03 Aol Llc Message screening system
US8190701B2 (en) 2010-11-01 2012-05-29 Seven Networks, Inc. Cache defeat detection and caching of content addressed by identifiers intended to defeat cache
US8200751B2 (en) 2008-05-20 2012-06-12 Raytheon Company System and method for maintaining stateful information
US8201103B2 (en) 2007-06-29 2012-06-12 Microsoft Corporation Accessing an out-space user interface for a document editor program
US8209709B2 (en) 2005-03-14 2012-06-26 Seven Networks, Inc. Cross-platform event engine
US8239882B2 (en) 2005-08-30 2012-08-07 Microsoft Corporation Markup based extensibility for user interfaces
US8255828B2 (en) 2004-08-16 2012-08-28 Microsoft Corporation Command user interface for displaying selectable software functionality controls
US8286085B1 (en) 2009-10-04 2012-10-09 Jason Adam Denise Attachment suggestion technology
US8290768B1 (en) * 2000-06-21 2012-10-16 International Business Machines Corporation System and method for determining a set of attributes based on content of communications
US8316098B2 (en) 2011-04-19 2012-11-20 Seven Networks Inc. Social caching for device resource sharing and management
US8327439B2 (en) 2006-05-10 2012-12-04 Mcafee, Inc. System, method and computer program product for identifying functions in computer code that control a behavior thereof when executed
US8326985B2 (en) 2010-11-01 2012-12-04 Seven Networks, Inc. Distributed management of keep-alive message signaling for mobile network resource conservation and optimization
US8332929B1 (en) 2007-01-10 2012-12-11 Mcafee, Inc. Method and apparatus for process enforced configuration management
US8352930B1 (en) 2006-04-24 2013-01-08 Mcafee, Inc. Software modification by group to minimize breakage
US20130013705A1 (en) * 2011-07-08 2013-01-10 Image Vision Labs, Inc. Image scene recognition
US8358844B2 (en) 2008-04-14 2013-01-22 Mcafee, Inc. System, method, and computer program product for determining whether text within an image includes unwanted data, utilizing a matrix
US8364181B2 (en) 2007-12-10 2013-01-29 Seven Networks, Inc. Electronic-mail filtering for mobile devices
US8370941B1 (en) 2008-05-06 2013-02-05 Mcafee, Inc. Rootkit scanning system, method, and computer program product
US8370928B1 (en) 2006-01-26 2013-02-05 Mcafee, Inc. System, method and computer program product for behavioral partitioning of a network to detect undesirable nodes
US8381284B2 (en) 2009-08-21 2013-02-19 Mcafee, Inc. System and method for enforcing security policies in a virtual environment
US8392998B1 (en) 2009-11-30 2013-03-05 Mcafee, Inc. Uniquely identifying attacked assets
US20130061334A1 (en) * 1997-08-12 2013-03-07 Hoyt A. Fleming, III Method and system for filtering unauthorized electronic mail messages
US8402096B2 (en) 2008-06-24 2013-03-19 Microsoft Corporation Automatic conversation techniques
US8406523B1 (en) 2005-12-07 2013-03-26 Mcafee, Inc. System, method and computer program product for detecting unwanted data using a rendered format
US8411684B1 (en) 2009-10-26 2013-04-02 Mcafee, Inc. System, method, and computer program product for determining a hop count between network devices utilizing a binary search
US20130086486A1 (en) * 2011-09-30 2013-04-04 Michael James Ahiakpor Mutable Message Attributes
US8417823B2 (en) 2010-11-22 2013-04-09 Seven Network, Inc. Aligning data transfer to optimize connections established for transmission over a wireless network
US8438633B1 (en) 2005-04-21 2013-05-07 Seven Networks, Inc. Flexible real-time inbox access
US8447722B1 (en) 2009-03-25 2013-05-21 Mcafee, Inc. System and method for data mining and security policy management
US8458794B1 (en) 2007-09-06 2013-06-04 Mcafee, Inc. System, method, and computer program product for determining whether a hook is associated with potentially unwanted activity
US8458789B1 (en) 2006-03-09 2013-06-04 Mcafee, Inc. System, method and computer program product for identifying unwanted code associated with network communications
US8463800B2 (en) 2005-10-19 2013-06-11 Mcafee, Inc. Attributes of captured objects in a capture system
US8468256B1 (en) 2001-03-08 2013-06-18 Mcafee, Inc. Automatically configuring a computer firewall based on network connection
US8473442B1 (en) 2009-02-25 2013-06-25 Mcafee, Inc. System and method for intelligent state management
US8479297B1 (en) 2010-11-23 2013-07-02 Mcafee, Inc. Prioritizing network assets
US8484314B2 (en) 2010-11-01 2013-07-09 Seven Networks, Inc. Distributed caching in a wireless network of content delivered for a mobile application over a long-held request
US8484725B1 (en) 2005-10-26 2013-07-09 Mcafee, Inc. System, method and computer program product for utilizing a threat scanner for performing non-threat-related processing
US8484295B2 (en) 2004-12-21 2013-07-09 Mcafee, Inc. Subscriber reputation filtering method for analyzing subscriber activity and detecting account misuse
US8484578B2 (en) 2007-06-29 2013-07-09 Microsoft Corporation Communication between a document editor in-space user interface and a document editor out-space user interface
US8495745B1 (en) 2009-11-30 2013-07-23 Mcafee, Inc. Asset risk analysis
US8495700B2 (en) 2005-02-28 2013-07-23 Mcafee, Inc. Mobile data security system and methods
US8495747B1 (en) 2010-03-31 2013-07-23 Mcafee, Inc. Prioritizing asset remediations
US8495386B2 (en) 2011-04-05 2013-07-23 Mcafee, Inc. Encryption of memory device with wear leveling
US20130191919A1 (en) * 2012-01-19 2013-07-25 Mcafee, Inc. Calculating quantitative asset risk
US8499351B1 (en) 2009-12-17 2013-07-30 Mcafee, Inc. Isolated security monitoring system
US8503717B2 (en) 2007-12-04 2013-08-06 Mcafee, Inc. Detection of spam images
US8504537B2 (en) 2006-03-24 2013-08-06 Mcafee, Inc. Signature distribution in a document registration system
US8504622B1 (en) 2007-11-05 2013-08-06 Mcafee, Inc. System, method, and computer program product for reacting based on a frequency in which a compromised source communicates unsolicited electronic messages
US8515075B1 (en) 2008-01-31 2013-08-20 Mcafee, Inc. Method of and system for malicious software detection using critical address space protection
US8520512B2 (en) 2005-01-26 2013-08-27 Mcafee, Inc. Network appliance for customizable quarantining of a node on a network
US8522199B2 (en) 2010-02-26 2013-08-27 Mcafee, Inc. System, method, and computer program product for applying a regular expression to content based on required strings of the regular expression
US8521891B1 (en) 2007-06-21 2013-08-27 Mcafee, Inc. Network browser system, method, and computer program product for conditionally loading a portion of data from a network based on a data transfer rate
US8527978B1 (en) 2008-03-31 2013-09-03 Mcafee, Inc. System, method, and computer program product for populating a list of known wanted data
US8528092B2 (en) 2007-10-17 2013-09-03 Mcafee, Inc. System, method, and computer program product for identifying unwanted activity utilizing a honeypot device accessible via VLAN trunking
US8539063B1 (en) 2003-08-29 2013-09-17 Mcafee, Inc. Method and system for containment of networked application client software by explicit human input
US8544003B1 (en) 2008-12-11 2013-09-24 Mcafee, Inc. System and method for managing virtual machine configurations
US8549611B2 (en) 2002-03-08 2013-10-01 Mcafee, Inc. Systems and methods for classification of messaging entities
US8549635B2 (en) 2003-04-01 2013-10-01 Mcafee, Inc. Malware detection using external call characteristics
US8549003B1 (en) 2010-09-12 2013-10-01 Mcafee, Inc. System and method for clustering host inventories
US8549546B2 (en) 2003-12-17 2013-10-01 Mcafee, Inc. Method and system for containment of usage of language interfaces
US8548170B2 (en) 2003-12-10 2013-10-01 Mcafee, Inc. Document de-registration
USD691167S1 (en) 2011-10-26 2013-10-08 Mcafee, Inc. Computer having graphical user interface
US8555404B1 (en) 2006-05-18 2013-10-08 Mcafee, Inc. Connectivity-based authorization
US8554774B2 (en) 2005-08-31 2013-10-08 Mcafee, Inc. System and method for word indexing in a capture system and querying thereof
US8555374B2 (en) 2000-07-05 2013-10-08 Mcafee, Inc. High performance packet processing using a general purpose processor
US8555389B2 (en) 2005-01-10 2013-10-08 Mcafee, Inc. Integrated firewall, IPS, and virus scanner system and method
US8560534B2 (en) 2004-08-23 2013-10-15 Mcafee, Inc. Database for a capture system
US8561198B2 (en) 2010-05-07 2013-10-15 Mcafee, Inc. Detection of malicious system calls
US8561167B2 (en) 2002-03-08 2013-10-15 Mcafee, Inc. Web reputation scoring
US8560521B2 (en) 2007-12-21 2013-10-15 Mcafee, Inc. System, method, and computer program product for processing a prefix tree file utilizing a selected agent
US8566942B2 (en) 2009-09-23 2013-10-22 Mcafee, Inc. System, method, and computer program product for tracking the migration of objects to determine whether to perform a network based check
USD692451S1 (en) 2011-10-26 2013-10-29 Mcafee, Inc. Computer having graphical user interface
US8572732B2 (en) 2009-04-21 2013-10-29 Mcafee, Inc. System, method, and computer program product for enabling communication between security systems
US8578501B1 (en) * 2006-11-14 2013-11-05 John W. Ogilvie Anonymous social networking with community-based privacy reviews obtained by members
US8578051B2 (en) 2007-01-24 2013-11-05 Mcafee, Inc. Reputation based load balancing
US8589503B2 (en) 2008-04-04 2013-11-19 Mcafee, Inc. Prioritizing network traffic
USD693845S1 (en) 2011-10-26 2013-11-19 Mcafee, Inc. Computer having graphical user interface
US8590002B1 (en) 2006-11-29 2013-11-19 Mcafee Inc. System, method and computer program product for maintaining a confidentiality of data on a network
US8595822B2 (en) 2011-12-29 2013-11-26 Mcafee, Inc. System and method for cloud based scanning for computer vulnerabilities in a network environment
US8601067B2 (en) 2007-04-30 2013-12-03 Mcafee, Inc. Electronic message manager system, method, and computer scanning an electronic message for unwanted content and associated unwanted sites
US8601451B2 (en) 2007-08-29 2013-12-03 Mcafee, Inc. System, method, and computer program product for determining whether code is unwanted based on the decompilation thereof
US8601160B1 (en) 2006-02-09 2013-12-03 Mcafee, Inc. System, method and computer program product for gathering information relating to electronic content utilizing a DNS server
US8601094B2 (en) 2007-09-17 2013-12-03 Mcafee, Inc. Method and computer program product utilizing multiple UDP data packets to transfer a quantity of data otherwise in excess of a single UDP packet
US8605090B2 (en) 2006-06-01 2013-12-10 Microsoft Corporation Modifying and formatting a chart using pictorially provided chart elements
US8613093B2 (en) 2007-08-15 2013-12-17 Mcafee, Inc. System, method, and computer program product for comparing an object with object enumeration results to identify an anomaly that at least potentially indicates unwanted activity
US8613006B2 (en) 2007-08-17 2013-12-17 Mcafee, Inc. System, method, and computer program product for terminating a hidden kernel process
US8615582B2 (en) 2002-01-15 2013-12-24 Mcafee, Inc. System and method for network vulnerability detection and reporting
US8615502B2 (en) 2008-04-18 2013-12-24 Mcafee, Inc. Method of and system for reverse mapping vnode pointers
US8621075B2 (en) 2011-04-27 2013-12-31 Seven Metworks, Inc. Detecting and preserving state for satisfying application requests in a distributed proxy and cache system
US8621008B2 (en) 2007-04-26 2013-12-31 Mcafee, Inc. System, method and computer program product for performing an action based on an aspect of an electronic mail message thread
US8621638B2 (en) 2010-05-14 2013-12-31 Mcafee, Inc. Systems and methods for classification of messaging entities
US8621077B2 (en) 2001-09-21 2013-12-31 Mcafee, Inc. Distribution of security policies for small to medium-sized organizations
US8621559B2 (en) 2007-11-06 2013-12-31 Mcafee, Inc. Adjusting filter or classification control settings
US8627466B2 (en) 2003-03-13 2014-01-07 Mcafee, Inc. Alert message control of security mechanisms in data processing systems
US8627443B2 (en) 2001-12-20 2014-01-07 Mcafee, Inc. Network adapter firewall system and method
US8627222B2 (en) 2005-09-12 2014-01-07 Microsoft Corporation Expanded search and find user interface
US8627462B2 (en) 2010-05-10 2014-01-07 Mcafee, Inc. Token processing
US8627099B2 (en) 2005-08-01 2014-01-07 Mcafee, Inc. System, method and computer program product for removing null values during scanning
US8631124B2 (en) 2002-11-13 2014-01-14 Mcafee, Inc. Network analysis system and method utilizing collected metadata
US8645478B2 (en) 2009-12-10 2014-02-04 Mcafee, Inc. System and method for monitoring social engineering in a computer network environment
US8646089B2 (en) 2011-10-18 2014-02-04 Mcafee, Inc. System and method for transitioning to a whitelist mode during a malware attack in a network environment
US8650287B2 (en) 2011-04-27 2014-02-11 Mcafee, Inc. Local reputation to adjust sensitivity of behavioral detection system
US8650200B2 (en) 2007-03-19 2014-02-11 Mcafee, Inc. System, method, and computer program product for identifying objects as at least potentially unwanted based on strings of symbols
US8650638B2 (en) 2011-10-18 2014-02-11 Mcafee, Inc. System and method for detecting a file embedded in an arbitrary location and determining the reputation of the file
US8655959B2 (en) 2008-01-03 2014-02-18 Mcafee, Inc. System, method, and computer program product for providing a rating of an electronic message
US8656039B2 (en) 2003-12-10 2014-02-18 Mcafee, Inc. Rule parser
US8656502B2 (en) 2002-04-04 2014-02-18 Mcafee, Inc. Controlling use of a computer program installed on a computer
US8661102B1 (en) 2005-11-28 2014-02-25 Mcafee, Inc. System, method and computer program product for detecting patterns among information from a distributed honey pot system
US8661126B2 (en) 2002-01-15 2014-02-25 Mcafee, Inc. System and method for network vulnerability detection and reporting
US8667582B2 (en) 2007-12-10 2014-03-04 Mcafee, Inc. System, method, and computer program product for directing predetermined network traffic to a honeypot
US8667121B2 (en) 2009-03-25 2014-03-04 Mcafee, Inc. System and method for managing data and policies
US8671087B2 (en) 2007-12-18 2014-03-11 Mcafee, Inc. System, method and computer program product for scanning and indexing data for different purposes
US8677497B2 (en) 2011-10-17 2014-03-18 Mcafee, Inc. Mobile risk assessment
US8677487B2 (en) 2011-10-18 2014-03-18 Mcafee, Inc. System and method for detecting a malicious command and control channel
US8683220B2 (en) 2011-09-29 2014-03-25 Mcafee, Inc. System and method for securing database activity
US8683035B2 (en) 2006-05-22 2014-03-25 Mcafee, Inc. Attributes of captured objects in a capture system
US8689137B2 (en) 2005-09-07 2014-04-01 Microsoft Corporation Command user interface for displaying selectable functionality controls in a database application
US8695027B2 (en) 2011-06-30 2014-04-08 Mcafee, Inc. System and method for application security assessment
US8693494B2 (en) 2007-06-01 2014-04-08 Seven Networks, Inc. Polling
US8694738B2 (en) 2011-10-11 2014-04-08 Mcafee, Inc. System and method for critical address space protection in a hypervisor environment
US8700561B2 (en) 2011-12-27 2014-04-15 Mcafee, Inc. System and method for providing data protection workflows in a network environment
US8701196B2 (en) 2006-03-31 2014-04-15 Mcafee, Inc. System, method and computer program product for obtaining a reputation associated with a file
US8700728B2 (en) 2010-11-01 2014-04-15 Seven Networks, Inc. Cache defeat detection and caching of content addressed by identifiers intended to defeat cache
US8707446B2 (en) 2006-02-02 2014-04-22 Mcafee, Inc. Enforcing alignment of approved changes and deployed changes in the software change life-cycle
US8707425B2 (en) 2007-09-07 2014-04-22 Mcafee, Inc. System, method, and computer program product for preventing scanning of a copy of a message
US8707434B2 (en) 2011-08-17 2014-04-22 Mcafee, Inc. System and method for indirect interface monitoring and plumb-lining
US8707008B2 (en) 2004-08-24 2014-04-22 Mcafee, Inc. File system for a capture system
US8706709B2 (en) 2009-01-15 2014-04-22 Mcafee, Inc. System and method for intelligent term grouping
US8713468B2 (en) 2008-08-06 2014-04-29 Mcafee, Inc. System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy
US8713668B2 (en) 2011-10-17 2014-04-29 Mcafee, Inc. System and method for redirected firewall discovery in a network environment
US8730955B2 (en) 2005-08-12 2014-05-20 Mcafee, Inc. High speed packet capture
US8739189B2 (en) 2008-01-24 2014-05-27 Mcafee, Inc. System, method, and computer program product for invoking an application program interface within an interception of another application program interface
US8739272B1 (en) 2012-04-02 2014-05-27 Mcafee, Inc. System and method for interlocking a host and a gateway
US8750108B2 (en) 2006-10-23 2014-06-10 Mcafee, Inc. System and method for controlling mobile device access to a network
US8750123B1 (en) 2013-03-11 2014-06-10 Seven Networks, Inc. Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network
US8756290B2 (en) 2006-11-29 2014-06-17 Mcafee, Inc. System, method and computer program product for reconstructing data received by a computer in a manner that is independent of the computer
US8762386B2 (en) 2003-12-10 2014-06-24 Mcafee, Inc. Method and apparatus for data capture and analysis system
US8761756B2 (en) 2005-06-21 2014-06-24 Seven Networks International Oy Maintaining an IP connection in a mobile network
US8762537B2 (en) 2007-01-24 2014-06-24 Mcafee, Inc. Multi-dimensional reputation scoring
US8763118B2 (en) 2005-07-14 2014-06-24 Mcafee, Inc. Classification of software on networked systems
US8763114B2 (en) 2007-01-24 2014-06-24 Mcafee, Inc. Detecting image spam
US8762880B2 (en) 2007-06-29 2014-06-24 Microsoft Corporation Exposing non-authoring features through document status information in an out-space user interface
US8769692B1 (en) 2011-07-14 2014-07-01 Mcafee, Inc. System and method for detecting malware by transforming objects and analyzing different views of objects
US8775631B2 (en) 2012-07-13 2014-07-08 Seven Networks, Inc. Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications
US8776230B1 (en) 2001-10-02 2014-07-08 Mcafee, Inc. Master security policy server
US8776252B2 (en) 2007-06-13 2014-07-08 Mcafee, Inc. System, method, and computer program product for securing data on a server based on a heuristic analysis
US8774844B2 (en) 2007-06-01 2014-07-08 Seven Networks, Inc. Integrated messaging
US8782084B2 (en) 2009-03-31 2014-07-15 Mcafee, Inc. System, method, and computer program product for conditionally allowing access to data on a device based on a location of the device
US8782260B2 (en) 1998-10-09 2014-07-15 Mcafee, Inc. Network access control system and method using adaptive proxies
US8787947B2 (en) 2008-06-18 2014-07-22 Seven Networks, Inc. Application discovery on mobile devices
US8789190B2 (en) 2011-12-23 2014-07-22 Mcafee, Inc. System and method for scanning for computer vulnerabilities in a network environment
US8793802B2 (en) 2007-05-22 2014-07-29 Mcafee, Inc. System, method, and computer program product for preventing data leakage utilizing a map of data
US8793305B2 (en) 2007-12-13 2014-07-29 Seven Networks, Inc. Content delivery to a mobile device from a content service
US8800024B2 (en) 2011-10-17 2014-08-05 Mcafee, Inc. System and method for host-initiated firewall discovery in a network environment
US8799410B2 (en) 2008-01-28 2014-08-05 Seven Networks, Inc. System and method of a relay server for managing communications and notification between a mobile device and a web access server
US8799450B2 (en) 2008-10-14 2014-08-05 Mcafee, Inc. Server-based system, method, and computer program product for scanning data on a client using only a subset of the data
US8799808B2 (en) 2003-07-01 2014-08-05 Microsoft Corporation Adaptive multi-line view user interface
US8800046B2 (en) 2012-04-10 2014-08-05 Mcafee, Inc. Unified scan engine
US8806645B2 (en) 2011-04-01 2014-08-12 Mcafee, Inc. Identifying relationships between security metrics
US8805334B2 (en) 2004-11-22 2014-08-12 Seven Networks, Inc. Maintaining mobile terminal information for secure communications
US8806615B2 (en) 2010-11-04 2014-08-12 Mcafee, Inc. System and method for protecting specified data combinations
US8812695B2 (en) 2012-04-09 2014-08-19 Seven Networks, Inc. Method and system for management of a virtual network connection without heartbeat messages
US8819445B2 (en) 2012-04-09 2014-08-26 Mcafee, Inc. Wireless token authentication
US8819306B2 (en) 2001-08-24 2014-08-26 Intel Corporation General input/output architecture with PCI express protocol with credit-based flow control
US8826443B1 (en) 2008-09-18 2014-09-02 Symantec Corporation Selective removal of protected content from web requests sent to an interactive website
US8832228B2 (en) 2011-04-27 2014-09-09 Seven Networks, Inc. System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief
US8838714B2 (en) 2001-02-20 2014-09-16 Mcafee, Inc. Unwanted e-mail filtering system including voting feedback
US8838783B2 (en) 2010-07-26 2014-09-16 Seven Networks, Inc. Distributed caching for resource and mobile network traffic management
US8839139B2 (en) 2004-09-30 2014-09-16 Microsoft Corporation User interface for providing task management and calendar information
US8839417B1 (en) 2003-11-17 2014-09-16 Mcafee, Inc. Device, system and method for defending a computer network
US8839349B2 (en) 2011-10-18 2014-09-16 Mcafee, Inc. Integrating security policy and event management
US8843153B2 (en) 2010-11-01 2014-09-23 Seven Networks, Inc. Mobile traffic categorization and policy for network use optimization while preserving user experience
US8850512B2 (en) 2011-10-13 2014-09-30 Mcafee, Inc. Security assessment of virtual machine environments
US8850591B2 (en) 2009-01-13 2014-09-30 Mcafee, Inc. System and method for concept building
US8850029B2 (en) 2008-02-14 2014-09-30 Mcafee, Inc. System, method, and computer program product for managing at least one aspect of a connection based on application behavior
US8850543B2 (en) 2012-12-23 2014-09-30 Mcafee, Inc. Hardware-based device authentication
US8849902B2 (en) 2008-01-25 2014-09-30 Seven Networks, Inc. System for providing policy based content service in a mobile network
US8849734B2 (en) 2010-06-29 2014-09-30 Mcafee Inc. System, method, and computer program product for updating an algorithm
US8856931B2 (en) 2007-04-30 2014-10-07 Mcafee, Inc. Network browser system, method, and computer program product for scanning data for unwanted content and associated unwanted sites
US8863159B2 (en) 2006-07-11 2014-10-14 Mcafee, Inc. System, method and computer program product for inserting an emulation layer in association with a COM server DLL
US8861354B2 (en) 2011-12-14 2014-10-14 Seven Networks, Inc. Hierarchies and categories for management and deployment of policies for distributed wireless traffic optimization
US8862752B2 (en) 2007-04-11 2014-10-14 Mcafee, Inc. System, method, and computer program product for conditionally preventing the transfer of data based on a location thereof
US8868753B2 (en) 2011-12-06 2014-10-21 Seven Networks, Inc. System of redundantly clustered machines to provide failover mechanisms for mobile traffic management and network resource conservation
US8869272B2 (en) 2010-08-13 2014-10-21 Mcafee, Inc. System, method, and computer program product for preventing a modification to a domain name system setting
US8874766B2 (en) 2012-03-09 2014-10-28 Mcafee, Inc. System and method for flexible network access control policies in a network environment
US8874761B2 (en) 2013-01-25 2014-10-28 Seven Networks, Inc. Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols
US8881289B2 (en) 2011-10-18 2014-11-04 Mcafee, Inc. User behavioral risk assessment
US8886630B2 (en) 2011-12-29 2014-11-11 Mcafee, Inc. Collaborative searching
US8886176B2 (en) 2010-07-26 2014-11-11 Seven Networks, Inc. Mobile application traffic optimization
US8903954B2 (en) 2010-11-22 2014-12-02 Seven Networks, Inc. Optimization of resource polling intervals to satisfy mobile device requests
US8909759B2 (en) 2008-10-10 2014-12-09 Seven Networks, Inc. Bandwidth measurement
US8909202B2 (en) 2012-01-05 2014-12-09 Seven Networks, Inc. Detection and management of user interactions with foreground applications on a mobile device in distributed caching
US8918872B2 (en) 2008-06-27 2014-12-23 Mcafee, Inc. System, method, and computer program product for reacting in response to a detection of an attempt to store a configuration file and an executable file on a removable device
US8918864B2 (en) 2007-06-05 2014-12-23 Mcafee, Inc. System, method, and computer program product for making a scan decision during communication of data over a network
US8918503B2 (en) 2011-12-06 2014-12-23 Seven Networks, Inc. Optimization of mobile traffic directed to private networks and operator configurability thereof
US8925101B2 (en) 2010-07-28 2014-12-30 Mcafee, Inc. System and method for local protection against malicious software
US8930689B2 (en) 2011-09-28 2015-01-06 Mcafee, Inc. Securing email conversations
US8931043B2 (en) 2012-04-10 2015-01-06 Mcafee Inc. System and method for determining and using local reputations of users and hosts to protect information in a network environment
US8935752B1 (en) 2009-03-23 2015-01-13 Symantec Corporation System and method for identity consolidation
US8935384B2 (en) 2010-05-06 2015-01-13 Mcafee Inc. Distributed data revocation using data commands
US8938800B2 (en) 2010-07-28 2015-01-20 Mcafee, Inc. System and method for network level protection against malicious software
USRE45348E1 (en) 2004-10-20 2015-01-20 Seven Networks, Inc. Method and apparatus for intercepting events in a communication system
AU2012258355B2 (en) * 2005-06-09 2015-01-22 Glasswall (Ip) Limited Resisting the Spread of Unwanted Code and Data
US8949976B2 (en) 2001-06-15 2015-02-03 Mcafee Inc. Scanning computer files for specified content
US8954573B2 (en) 2012-04-11 2015-02-10 Mcafee Inc. Network address repository management
US8955121B2 (en) 2008-04-29 2015-02-10 Mcafee, Inc. System, method, and computer program product for dynamically adjusting a level of security applied to a system
US8955036B2 (en) 2012-04-11 2015-02-10 Mcafee, Inc. System asset repository management
US8954578B2 (en) 2002-07-26 2015-02-10 Mcafee Inc. System and method for heuristic determination of network protocols
US8955075B2 (en) 2012-12-23 2015-02-10 Mcafee Inc Hardware-based device authentication
USD722613S1 (en) 2011-10-27 2015-02-17 Mcafee Inc. Computer display screen with graphical user interface
US8966638B2 (en) 2008-01-07 2015-02-24 Mcafee, Inc. System, method, and computer program product for selecting a wireless network based on security information
US8973144B2 (en) 2011-10-13 2015-03-03 Mcafee, Inc. System and method for kernel rootkit protection in a hypervisor environment
US8973147B2 (en) 2011-12-29 2015-03-03 Mcafee, Inc. Geo-mapping system security events
US8973146B2 (en) 2012-12-27 2015-03-03 Mcafee, Inc. Herd based scan avoidance system in a network environment
US8977697B2 (en) 2007-01-29 2015-03-10 Litera Technology Llc Methods and systems for removing metadata from an electronic document attached to a message sent from a mobile electronic device
US8984581B2 (en) 2011-07-27 2015-03-17 Seven Networks, Inc. Monitoring mobile application activities for malicious traffic on a mobile device
US20150081820A1 (en) * 1999-03-11 2015-03-19 Easyweb Innovations, Inc. Message publishing with prohibited or restricted content removal
US8997234B2 (en) 2011-07-27 2015-03-31 Mcafee, Inc. System and method for network-based asset operational dependence scoring
US9002771B2 (en) 2008-02-19 2015-04-07 Mcafee, Inc. System, method, and computer program product for applying a rule to associated events
US9002828B2 (en) 2007-12-13 2015-04-07 Seven Networks, Inc. Predictive content delivery
US9009250B2 (en) 2011-12-07 2015-04-14 Seven Networks, Inc. Flexible and dynamic integration schemas of a traffic management system with various network operators for network traffic alleviation
US9015621B2 (en) 2004-08-16 2015-04-21 Microsoft Technology Licensing, Llc Command user interface for displaying multiple sections of software functionality controls
US9015472B1 (en) 2005-03-10 2015-04-21 Mcafee, Inc. Marking electronic messages to indicate human origination
US9015793B2 (en) 2012-12-21 2015-04-21 Mcafee, Inc. Hardware management interface
US9021021B2 (en) 2011-12-14 2015-04-28 Seven Networks, Inc. Mobile network reporting and usage analytics system and method aggregated using a distributed traffic optimization system
US9026784B2 (en) 2012-01-26 2015-05-05 Mcafee, Inc. System and method for innovative management of transport layer security session tickets in a network environment
US9027132B2 (en) 2007-01-24 2015-05-05 Mcafee, Inc. System, method and computer program product for monitoring and/or analyzing at least one aspect of an invocation of an interface
US9043918B2 (en) 2011-10-13 2015-05-26 Mcafee, Inc. System and method for profile based filtering of outgoing information in a mobile environment
US9043433B2 (en) 2010-07-26 2015-05-26 Seven Networks, Inc. Mobile network traffic coordination across multiple applications
US9043731B2 (en) 2010-03-30 2015-05-26 Seven Networks, Inc. 3D mobile user interface with configurable workspace management
US9049207B2 (en) 2012-04-11 2015-06-02 Mcafee, Inc. Asset detection system
US9049235B2 (en) 2012-07-16 2015-06-02 Mcafee, Inc. Cloud email message scanning with local policy application in a network environment
US9055098B2 (en) 2001-12-20 2015-06-09 Mcafee, Inc. Embedded anti-virus scanner for a network adapter
USRE45558E1 (en) 2002-12-30 2015-06-09 Facebook, Inc. Supervising user interaction with online services
US9055102B2 (en) 2006-02-27 2015-06-09 Seven Networks, Inc. Location-based operations and messaging
US9060032B2 (en) 2010-11-01 2015-06-16 Seven Networks, Inc. Selective data compression by a distributed traffic management system to reduce mobile data traffic and signaling traffic
US9065765B2 (en) 2013-07-22 2015-06-23 Seven Networks, Inc. Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network
US9069586B2 (en) 2011-10-13 2015-06-30 Mcafee, Inc. System and method for kernel rootkit protection in a hypervisor environment
US9075993B2 (en) 2011-01-24 2015-07-07 Mcafee, Inc. System and method for selectively grouping and managing program files
US9077630B2 (en) 2010-07-26 2015-07-07 Seven Networks, Inc. Distributed implementation of dynamic wireless traffic policy
US9092624B2 (en) 2007-10-16 2015-07-28 Mcafee, Inc. System, method, and computer program product for conditionally performing a scan on data based on an associated data structure
US9098837B2 (en) 2003-06-26 2015-08-04 Microsoft Technology Licensing, Llc Side-by-side shared calendars
US9106680B2 (en) 2011-06-27 2015-08-11 Mcafee, Inc. System and method for protocol fingerprinting and reputation correlation
US9106478B2 (en) 2006-12-19 2015-08-11 Mcafee, Inc. System, method and computer program product for scanning portions of data
US9112830B2 (en) 2011-02-23 2015-08-18 Mcafee, Inc. System and method for interlocking a host and a gateway
US9122877B2 (en) 2011-03-21 2015-09-01 Mcafee, Inc. System and method for malware and network reputation correlation
US9131370B2 (en) 2011-12-29 2015-09-08 Mcafee, Inc. Simplified mobile communication device
US9135443B2 (en) 2010-05-06 2015-09-15 Mcafee, Inc. Identifying malicious threads
US9143519B2 (en) 2013-03-15 2015-09-22 Mcafee, Inc. Remote malware remediation
US9152784B2 (en) 2012-04-18 2015-10-06 Mcafee, Inc. Detection and prevention of installation of malicious mobile applications
US9161258B2 (en) 2012-10-24 2015-10-13 Seven Networks, Llc Optimized and selective management of policy deployment to mobile clients in a congested network to prevent further aggravation of network congestion
US9166984B2 (en) 2005-12-21 2015-10-20 Mcafee, Inc. System, method and computer program product for controlling network communications based on policy compliance
US9172715B2 (en) 2011-04-27 2015-10-27 Mcafee, Inc. Stealth network attack monitoring
US9173128B2 (en) 2011-12-07 2015-10-27 Seven Networks, Llc Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol
US9185093B2 (en) 2012-10-16 2015-11-10 Mcafee, Inc. System and method for correlating network information with subscriber information in a mobile network environment
US9183386B2 (en) 2007-11-27 2015-11-10 Mcafee, Inc. Windows registry modification verification
US9197660B2 (en) 2013-03-15 2015-11-24 Mcafee, Inc. Generic privilege escalation prevention
US9203864B2 (en) 2012-02-02 2015-12-01 Seven Networks, Llc Dynamic categorization of applications for network access in a mobile network
US9210111B2 (en) 2005-02-28 2015-12-08 Mcafee, Inc. Stopping and remediating outbound messaging abuse
US9215197B2 (en) 2007-08-17 2015-12-15 Mcafee, Inc. System, method, and computer program product for preventing image-related data loss
US9213838B2 (en) 2011-05-13 2015-12-15 Mcafee Ireland Holdings Limited Systems and methods of processing data associated with detection and/or handling of malware
US20150381533A1 (en) * 2014-06-29 2015-12-31 Avaya Inc. System and Method for Email Management Through Detection and Analysis of Dynamically Variable Behavior and Activity Patterns
US9231976B2 (en) 2013-03-15 2016-01-05 Mcafee, Inc. Creating and managing a network security tag
US9241314B2 (en) 2013-01-23 2016-01-19 Seven Networks, Llc Mobile device with application or context aware fast dormancy
US9253154B2 (en) 2008-08-12 2016-02-02 Mcafee, Inc. Configuration management for a capture/registration system
US9251351B2 (en) 2011-09-21 2016-02-02 Mcafee, Inc. System and method for grouping computer vulnerabilities
US9250928B2 (en) 2011-10-18 2016-02-02 Mcafee, Inc. Cooperative mobile analytics
US9262624B2 (en) 2011-09-16 2016-02-16 Mcafee, Inc. Device-tailored whitelists
US9262623B2 (en) 2012-08-22 2016-02-16 Mcafee, Inc. Anonymous shipment brokering
US9262592B2 (en) 2012-04-09 2016-02-16 Mcafee, Inc. Wireless storage device
US9268933B2 (en) 2012-08-22 2016-02-23 Mcafee, Inc. Privacy broker
US9275163B2 (en) 2010-11-01 2016-03-01 Seven Networks, Llc Request and response characteristics based adaptation of distributed caching in a mobile network
US9298910B2 (en) 2011-06-08 2016-03-29 Mcafee, Inc. System and method for virtual partition monitoring
US9307493B2 (en) 2012-12-20 2016-04-05 Seven Networks, Llc Systems and methods for application management of mobile device radio state promotion and demotion
US9311126B2 (en) 2011-07-27 2016-04-12 Mcafee, Inc. System and method for virtual partition monitoring
US9311480B2 (en) 2013-03-15 2016-04-12 Mcafee, Inc. Server-assisted anti-malware client
US9319362B1 (en) * 2012-01-25 2016-04-19 Solace Systems, Inc. Messaging system with distributed filtering modules which register interests, remove any messages that do not match the registered interest, and forward any matched messages for delivery
US9323935B2 (en) 2012-12-18 2016-04-26 Mcafee, Inc. User device security profile
US9325662B2 (en) 2011-01-07 2016-04-26 Seven Networks, Llc System and method for reduction of mobile network traffic used for domain name system (DNS) queries
US9326134B2 (en) 2012-10-19 2016-04-26 Mcafee Inc. Data loss prevention for mobile computing devices
US9326189B2 (en) 2012-02-03 2016-04-26 Seven Networks, Llc User as an end point for profiling and optimizing the delivery of content and data in a wireless network
US9330196B2 (en) 2010-11-01 2016-05-03 Seven Networks, Llc Wireless traffic management system cache optimization using http headers
US9338657B2 (en) 2012-10-16 2016-05-10 Mcafee, Inc. System and method for correlating security events with subscriber information in a mobile network environment
US9351163B2 (en) 2012-12-26 2016-05-24 Mcafee, Inc. Automatic sanitization of data on a mobile device in a network environment
US9367397B1 (en) * 2011-12-20 2016-06-14 Emc Corporation Recovering data lost in data de-duplication system
US20160182429A1 (en) * 2014-12-18 2016-06-23 International Business Machines Corporation Policy-based delayed dispatch of e-mail messages
US20160182240A1 (en) * 2014-12-23 2016-06-23 Mcafee, Inc. Digital heritage notary
US9380072B2 (en) 2011-08-24 2016-06-28 Mcafee, Inc. System, method, and computer program for preventing infections from spreading in a network environment using dynamic application of a firewall policy
US20160188873A1 (en) * 2014-12-27 2016-06-30 Ned M. Smith Binary translation of a trusted binary with input tagging
CN105745886A (en) * 2013-09-23 2016-07-06 迈克菲股份有限公司 Providing a fast path between two entities
US20160205142A1 (en) * 2013-09-28 2016-07-14 Mcafee, Inc. Security-connected framework
US20160219063A1 (en) * 2013-09-28 2016-07-28 Mcafee, Inc. Context-aware network on a data exchange layer
US9407653B2 (en) 2012-04-10 2016-08-02 Mcafee, Inc. Unified scan management
US9419927B2 (en) 2006-11-14 2016-08-16 Mcafee, Inc. Method and system for handling unwanted email messages
US9419953B2 (en) 2012-12-23 2016-08-16 Mcafee, Inc. Trusted container
US9424154B2 (en) 2007-01-10 2016-08-23 Mcafee, Inc. Method of and system for computer system state checks
US9462471B2 (en) 2014-06-27 2016-10-04 Mcafee, Inc. Identification of call participants
US9465939B2 (en) 2014-06-27 2016-10-11 Mcafee, Inc. Mitigation of malware
US9483645B2 (en) 2008-03-05 2016-11-01 Mcafee, Inc. System, method, and computer program product for identifying unwanted data based on an assembled execution profile of code
US9516451B2 (en) 2012-04-10 2016-12-06 Mcafee, Inc. Opportunistic system scanning
US9525675B2 (en) 2014-12-26 2016-12-20 Mcafee, Inc. Encryption key retrieval
US9536057B2 (en) 2012-10-19 2017-01-03 Mcafee, Inc. Premises aware security
US9542667B2 (en) 2005-09-09 2017-01-10 Microsoft Technology Licensing, Llc Navigating messages within a thread
US9547761B2 (en) 2012-04-09 2017-01-17 Mcafee, Inc. Wireless token device
US9552497B2 (en) 2009-11-10 2017-01-24 Mcafee, Inc. System and method for preventing data loss using virtual machine wrapped applications
US9560014B2 (en) 2013-01-23 2017-01-31 Mcafee, Inc. System and method for an endpoint hardware assisted network firewall in a security environment
US9571507B2 (en) 2012-10-21 2017-02-14 Mcafee, Inc. Providing a virtual security appliance architecture to a virtual cloud infrastructure
US9576271B2 (en) 2003-06-24 2017-02-21 Google Inc. System and method for community centric resource sharing based on a publishing subscription model
US9578052B2 (en) 2013-10-24 2017-02-21 Mcafee, Inc. Agent assisted malicious application blocking in a network environment
US9584665B2 (en) 2000-06-21 2017-02-28 International Business Machines Corporation System and method for optimizing timing of responses to customer communications
US9589254B2 (en) 2010-12-08 2017-03-07 Microsoft Technology Licensing, Llc Using e-mail message characteristics for prioritization
US9591028B2 (en) 2013-09-30 2017-03-07 Mcafee, Inc. Visualization and analysis of complex security information
US9594881B2 (en) 2011-09-09 2017-03-14 Mcafee, Inc. System and method for passive threat detection using virtual memory inspection
US9609005B2 (en) 2014-09-25 2017-03-28 Mcafee, Inc. Cross-view malware detection
US9607086B2 (en) 2014-03-27 2017-03-28 Mcafee, Inc. Providing prevalence information using query data
US9614865B2 (en) 2013-03-15 2017-04-04 Mcafee, Inc. Server-assisted anti-malware client
US9645712B2 (en) 2004-10-01 2017-05-09 Grand Central Communications, Inc. Multiple stakeholders for a single business process
US9665850B2 (en) 2008-06-20 2017-05-30 Microsoft Technology Licensing, Llc Synchronized conversation-centric message list and message reading pane
US9665716B2 (en) 2014-12-23 2017-05-30 Mcafee, Inc. Discovery of malicious strings
US9672357B2 (en) 2015-02-26 2017-06-06 Mcafee, Inc. System and method to mitigate malware
US9672374B2 (en) 2012-10-19 2017-06-06 Mcafee, Inc. Secure disk access control
US9679140B2 (en) 2014-12-27 2017-06-13 Mcafee, Inc. Outbreak pathology inference
US9678687B2 (en) 2015-09-25 2017-06-13 Mcafee, Inc. User mode heap swapping
US9690448B2 (en) 2004-08-16 2017-06-27 Microsoft Corporation User interface for displaying selectable software functionality controls that are relevant to a selected object
US9699129B1 (en) 2000-06-21 2017-07-04 International Business Machines Corporation System and method for increasing email productivity
US9712545B2 (en) 2014-12-23 2017-07-18 Mcafee, Inc. Detection of a malicious peripheral
US9715597B2 (en) 2014-09-25 2017-07-25 Mcafee, Inc. Data verification using enclave attestation
US9723006B2 (en) 2015-06-27 2017-08-01 Mcafee, Inc. Temporary process deprivileging
US9727989B2 (en) 2006-06-01 2017-08-08 Microsoft Technology Licensing, Llc Modifying and formatting a chart using pictorially provided chart elements
US9741032B2 (en) 2012-12-18 2017-08-22 Mcafee, Inc. Security broker
US9756002B2 (en) 2014-03-21 2017-09-05 Litera Technologies, LLC Systems and methods for email attachments management
US9762591B2 (en) 2014-12-27 2017-09-12 Mcafee, Inc. Message sender authenticity validation
US9769186B2 (en) 2014-12-23 2017-09-19 Mcafee, Inc. Determining a reputation through network characteristics
US9767283B2 (en) 2014-06-27 2017-09-19 Mcafee, Inc. System and method to mitigate malicious calls
US9798895B2 (en) 2014-09-25 2017-10-24 Mcafee, Inc. Platform identity architecture with a temporary pseudonymous identity
US9798559B2 (en) 2014-12-27 2017-10-24 Mcafee, Inc. Trusted binary translation
US9807118B2 (en) 2014-10-26 2017-10-31 Mcafee, Inc. Security orchestration framework
US9817843B2 (en) 2014-09-26 2017-11-14 Mcafee, Inc. Notification of human safety reputation of a place based on historical events, profile data, and dynamic factors
US9832207B2 (en) 2014-12-23 2017-11-28 Mcafee, Inc. Input verification
US9832095B2 (en) 2011-12-14 2017-11-28 Seven Networks, Llc Operation modes for mobile traffic optimization and concurrent management of optimized and non-optimized traffic
US9833709B2 (en) 2006-05-10 2017-12-05 Mcafee, Llc Game console system, method and computer program product with anti-malware/spyware and parental control capabilities
CN107450495A (en) * 2017-08-25 2017-12-08 艾普工华科技(武汉)有限公司 A kind of flexibility based on message rule engine is in artefact management business model system
US9843550B2 (en) * 2015-11-29 2017-12-12 International Business Machines Corporation Processing messages in a data messaging system using constructed resource models
US9846774B2 (en) 2015-06-27 2017-12-19 Mcafee, Llc Simulation of an application
US9870466B2 (en) 2015-09-26 2018-01-16 Mcafee, Inc. Hardware-enforced code paths
US9870469B2 (en) 2014-09-26 2018-01-16 Mcafee, Inc. Mitigation of stack corruption exploits
US9876806B2 (en) 2014-09-25 2018-01-23 Mcafee, Llc Behavioral detection of malware agents
US9881072B2 (en) 2014-08-14 2018-01-30 McAFEE, LLC. Dynamic feature set management
US9886577B2 (en) 2014-09-26 2018-02-06 Mcafee, Llc Detection and mitigation of malicious invocation of sensitive code
US9898605B2 (en) 2015-12-24 2018-02-20 Mcafee, Llc Monitoring executed script for zero-day attack of malware
US9912528B2 (en) 2015-12-22 2018-03-06 Mcafee, Llc Security content over a management band
US9917775B2 (en) 2015-12-22 2018-03-13 Mcafee, Llc Intelligent devices in a software-defined network
US9914460B2 (en) 2015-09-25 2018-03-13 Mcafee, Llc Contextual scoring of automobile drivers
US20180091478A1 (en) * 2016-09-26 2018-03-29 Agari Data, Inc. Mitigating communication risk by verifying a sender of a message
US9934380B2 (en) 2014-12-23 2018-04-03 Mcafee, Llc Execution profiling detection of malicious objects
US9936018B2 (en) 2013-09-27 2018-04-03 Mcafee, Llc Task-context architecture for efficient data sharing
US9948644B2 (en) 2001-03-26 2018-04-17 Salesforce.Com, Inc. Routing messages between applications
US9955001B2 (en) 2014-09-23 2018-04-24 Mcafee, Llc Device lock while in motion
US9954883B2 (en) 2012-12-18 2018-04-24 Mcafee, Inc. Automated asset criticality assessment
US9961102B2 (en) 2014-07-16 2018-05-01 Mcafee, Llc Detection of stack pivoting
US9984230B2 (en) 2015-06-26 2018-05-29 Mcafee, Llc Profiling event based exploit detection
US10021137B2 (en) 2014-12-27 2018-07-10 Mcafee, Llc Real-time mobile security posture
US10025930B2 (en) 2015-12-24 2018-07-17 Mcafee, Llc Hardware assisted branch transfer self-check mechanism
US10031646B2 (en) 2011-09-07 2018-07-24 Mcafee, Llc Computer system security dashboard
US10044696B2 (en) 2015-12-22 2018-08-07 Mcafee, Llc Simplified sensor integrity
US10044739B2 (en) 2013-12-27 2018-08-07 McAFEE, LLC. Frequency-based reputation
US10050980B2 (en) 2015-06-27 2018-08-14 Mcafee, Llc Enterprise reputations for uniform resource locators
US10050993B2 (en) 2014-09-24 2018-08-14 Mcafee, Llc Non-invasive whitelisting
US10063419B2 (en) 2015-10-31 2018-08-28 Mcafee, Llc Establishing nodes for global routing manager
US10070313B2 (en) 2012-04-09 2018-09-04 Mcafee, Llc Wireless token device
US10075465B2 (en) 2014-10-09 2018-09-11 Bank Of America Corporation Exposure of an apparatus to a technical hazard
US20180262457A1 (en) * 2017-03-09 2018-09-13 Microsoft Technology Licensing, Llc Self-debugging of electronic message bugs
US10083295B2 (en) 2014-12-23 2018-09-25 Mcafee, Llc System and method to combine multiple reputations
US10083296B2 (en) 2015-06-27 2018-09-25 Mcafee, Llc Detection of malicious thread suspension
US10091224B2 (en) 2015-10-31 2018-10-02 Mcafee, Llc Implicit crowdsourcing for untracked correction or verification of categorization information
US10108613B2 (en) 2004-09-03 2018-10-23 Open Text Sa Ulc Systems and methods for providing access to data and searchable attributes in a collaboration place
US10114950B2 (en) 2012-10-19 2018-10-30 McAFEE, LLC. Mobile application management
US10129125B2 (en) 2015-12-18 2018-11-13 Mcafee, Llc Identifying a source device in a software-defined network
US10129291B2 (en) 2015-06-27 2018-11-13 Mcafee, Llc Anomaly detection to identify malware
US10140451B2 (en) 2013-01-16 2018-11-27 McAFEE, LLC. Detection of malicious scripting language code in a network environment
US10148624B2 (en) 2015-09-25 2018-12-04 Mcafee, Llc Secure service matching
US10148695B2 (en) 2013-09-28 2018-12-04 Mcafee, Llc Real-time policy distribution
US10154017B2 (en) 2015-04-30 2018-12-11 Mcafee, Llc Device pairing in a local network
US10162767B2 (en) 2015-06-27 2018-12-25 Mcafee, Llc Virtualized trusted storage
US10171594B2 (en) 2013-09-28 2019-01-01 Mcafee, Llc Service-oriented architecture
US10193858B2 (en) 2015-12-22 2019-01-29 Mcafee, Llc Attestation device custody transfer protocol
US10198587B2 (en) 2007-09-05 2019-02-05 Mcafee, Llc System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session
US10205798B2 (en) 2013-09-28 2019-02-12 Mcafee, Llc Merging multiple system trees over a data exchange layer
US10204384B2 (en) 2015-12-21 2019-02-12 Mcafee, Llc Data loss prevention of social media content
US10206100B2 (en) 2014-01-03 2019-02-12 Mcafee, Llc Secure context sharing for priority calling and various personal safety mechanisms
US10205712B2 (en) 2015-06-10 2019-02-12 Mcafee, Llc Sentinel appliance in an internet of things realm
US10210331B2 (en) 2015-12-24 2019-02-19 Mcafee, Llc Executing full logical paths for malware detection
US10237303B2 (en) 2013-09-29 2019-03-19 Mcafee, Llc Prevalence-based reputations
US10237254B2 (en) 2014-11-13 2019-03-19 Mcafee, Llc Conditional login promotion
US10263899B2 (en) 2012-04-10 2019-04-16 Seven Networks, Llc Enhanced customer service for mobile carriers using real-time and historical mobile application and traffic or optimization data associated with mobile devices in a mobile network
US10289570B2 (en) 2015-12-24 2019-05-14 Mcafee, Llc Detecting data corruption by control flow interceptions
US10296742B2 (en) 2015-10-31 2019-05-21 Mcafee, Llc Decision forest compilation
US10305929B2 (en) 2013-09-27 2019-05-28 Mcafee, Llc Managed software remediation
US10318746B2 (en) 2015-09-25 2019-06-11 Mcafee, Llc Provable traceability
US20190199672A1 (en) * 2017-12-21 2019-06-27 Knowmail S.A.L LTD. Digital messaging prioritization within an organization
US10339303B2 (en) 2015-01-22 2019-07-02 Mcafee, Llc Detection of malicious invocation of application program interface calls
US10354229B2 (en) 2008-08-04 2019-07-16 Mcafee, Llc Method and system for centralized contact management
US10409989B2 (en) 2014-12-26 2019-09-10 Mcafee, Llc Trusted updates
US10417417B2 (en) 2013-09-27 2019-09-17 Mcafee, Llc Digital protection that travels with data
US10417579B2 (en) 2015-09-25 2019-09-17 Mcafee, Inc. Multi-label classification for overlapping classes
US10445114B2 (en) 2008-03-31 2019-10-15 Microsoft Technology Licensing, Llc Associating command surfaces with multiple active components
US10445505B2 (en) 2014-09-22 2019-10-15 Mcafee, Llc Process vulnerability assessment
US10462156B2 (en) 2014-09-24 2019-10-29 Mcafee, Llc Determining a reputation of data using a data visa
US10467409B2 (en) 2014-12-23 2019-11-05 Mcafee, Llc Identification of malicious execution of a process
US10482429B2 (en) 2003-07-01 2019-11-19 Microsoft Technology Licensing, Llc Automatic grouping of electronic mail
US10484398B2 (en) 2013-09-29 2019-11-19 Mcafee, Llc Threat intelligence on a data exchange layer
US10530720B2 (en) 2015-08-27 2020-01-07 Mcafee, Llc Contextual privacy engine for notifications
US10536408B2 (en) 2015-09-16 2020-01-14 Litéra Corporation Systems and methods for detecting, reporting and cleaning metadata from inbound attachments
US10554624B2 (en) 2013-09-25 2020-02-04 Mcafee, Llc Proxy authentication for single sign-on
US10554662B2 (en) 2015-06-30 2020-02-04 Mcafee, Llc Security service for an unmanaged device
US10567170B2 (en) 2015-12-24 2020-02-18 Mcafee, Llc Hardware-generated dynamic identifier
US10574672B2 (en) 2016-07-01 2020-02-25 Mcafee, Llc System and method to detect bypass of a sandbox application
US10599662B2 (en) 2015-06-26 2020-03-24 Mcafee, Llc Query engine for remote endpoint information retrieval
US10604251B2 (en) 2016-09-29 2020-03-31 Mcafee, Llc Apparatus and methods for unmanned aerial vehicle servicing of modular device assembly
US10621977B2 (en) 2015-10-30 2020-04-14 Mcafee, Llc Trusted speech transcription
US10642976B2 (en) 2015-06-27 2020-05-05 Mcafee, Llc Malware detection using a digital certificate
US10659479B2 (en) 2015-03-27 2020-05-19 Mcafee, Llc Determination of sensor usage
US10674009B1 (en) 2013-11-07 2020-06-02 Rightquestion, Llc Validating automatic number identification data
US10678908B2 (en) 2013-09-27 2020-06-09 Mcafee, Llc Trusted execution of an executable object on a local device
US10691739B2 (en) 2015-12-22 2020-06-23 Mcafee, Llc Multi-label content recategorization
US10691476B2 (en) 2015-06-27 2020-06-23 Mcafee, Llc Protection of sensitive data
US10715543B2 (en) 2016-11-30 2020-07-14 Agari Data, Inc. Detecting computer security risk based on previously observed communications
US10749843B2 (en) 2013-09-29 2020-08-18 Mcafee, Llc One-click reputation adjustment
US10754703B2 (en) 2015-12-22 2020-08-25 Mcafee, Llc Trusted computing resource meter
US10791118B2 (en) 2018-03-29 2020-09-29 Mcafee, Llc Authenticating network services provided by a network
US10795994B2 (en) 2018-09-26 2020-10-06 Mcafee, Llc Detecting ransomware
US10803165B2 (en) 2015-06-27 2020-10-13 Mcafee, Llc Detection of shellcode
US10805314B2 (en) 2017-05-19 2020-10-13 Agari Data, Inc. Using message context to evaluate security of requested data
US10819804B2 (en) 2013-09-28 2020-10-27 Mcafee, Llc Efficient request-response routing over a data exchange layer
US10819780B2 (en) 2015-12-24 2020-10-27 Mcafee, Llc Protected data collection in a multi-node network
US10834027B2 (en) 2015-06-27 2020-11-10 Mcafee, Llc Protection of sensitive chat data
US10834109B2 (en) 2014-12-23 2020-11-10 Mcafee, Llc Determining a reputation for a process
US10838780B2 (en) 2018-12-10 2020-11-17 Mcafee, Llc Portable hosted content
US20200374112A1 (en) * 2017-12-01 2020-11-26 Huawei Technologies Co., Ltd. Secure Provisioning of Data to Client Device
US10880721B2 (en) 2008-07-28 2020-12-29 Voip-Pal.Com, Inc. Mobile gateway
US10880322B1 (en) 2016-09-26 2020-12-29 Agari Data, Inc. Automated tracking of interaction with a resource of a message
US10887266B2 (en) 2016-04-13 2021-01-05 Mcafee, Llc Personalization of delivery of notifications
US10887399B2 (en) 2008-07-30 2021-01-05 Mcafee, Llc System, method, and computer program product for managing a connection between a device and a network
US10891155B2 (en) 2014-01-03 2021-01-12 Mcafee, Llc Wearable device task offloading to conserve processing resources
US10904218B2 (en) 2013-11-25 2021-01-26 Mcafee, Llc Secure proxy to protect private data
US10932317B2 (en) 2009-09-17 2021-02-23 VolP-Pal.com, Inc. Uninterrupted transmission of internet protocol transmissions during endpoint changes
CN112448882A (en) * 2019-09-05 2021-03-05 北京国双科技有限公司 Mail service method and device for enterprise-level platform
US11019076B1 (en) 2017-04-26 2021-05-25 Agari Data, Inc. Message security assessment using sender identity profiles
US11032266B2 (en) 2014-12-23 2021-06-08 Mcafee, Llc Determining the reputation of a digital certificate
US11044077B2 (en) 2018-09-25 2021-06-22 Mcafee, Llc Modifiable client-side encrypted data in the cloud
US11044267B2 (en) 2016-11-30 2021-06-22 Agari Data, Inc. Using a measure of influence of sender in determining a security risk associated with an electronic message
US11049039B2 (en) 2016-09-30 2021-06-29 Mcafee, Llc Static and dynamic device profile reputation using cloud-based machine learning
US11100225B2 (en) 2018-12-28 2021-08-24 Mcafee, Llc Scanning of encrypted zip files
US11102244B1 (en) 2017-06-07 2021-08-24 Agari Data, Inc. Automated intelligence gathering
US11188978B2 (en) 2002-12-31 2021-11-30 Ebay Inc. Method and system to generate a listing in a network-based commerce system
US11263679B2 (en) 2009-10-23 2022-03-01 Ebay Inc. Product identification using multiple services
US11263325B2 (en) 2019-01-31 2022-03-01 Mcafee, Llc System and method for application exploration
US11283763B2 (en) 2018-12-28 2022-03-22 Mcafee, Llc On-device dynamic safe browsing
US11416606B2 (en) 2014-10-24 2022-08-16 Musarubra Us Llc Agent presence for self-healing
US11683279B2 (en) 2008-01-24 2023-06-20 Ebay Inc. System and method of using conversational agent to collect information and trigger actions
US11722513B2 (en) 2016-11-30 2023-08-08 Agari Data, Inc. Using a measure of influence of sender in determining a security risk associated with an electronic message
US11757914B1 (en) 2017-06-07 2023-09-12 Agari Data, Inc. Automated responsive message to determine a security risk of a message sender
US11831654B2 (en) 2015-12-22 2023-11-28 Mcafee, Llc Secure over-the-air updates
US11936738B2 (en) 2020-12-14 2024-03-19 Mcafee, Llc System, method, and computer program product for managing a connection between a device and a network

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4106060A (en) * 1975-12-15 1978-08-08 Rca Corporation Electronic mail box
US5204939A (en) * 1989-12-14 1993-04-20 Fujitsu Limited Rule base processing system and rule evaluation control method therein
US5283856A (en) * 1991-10-04 1994-02-01 Beyond, Inc. Event-driven rule-based messaging system
US5555346A (en) * 1991-10-04 1996-09-10 Beyond Corporated Event-driven rule-based messaging system
US5619648A (en) * 1994-11-30 1997-04-08 Lucent Technologies Inc. Message filtering techniques
US5632011A (en) * 1995-05-22 1997-05-20 Sterling Commerce, Inc. Electronic mail management system for operation on a host computer system
US5675733A (en) * 1992-11-30 1997-10-07 International Business Machines Corporation Statistical analysis and display of reception status of electronic messages
US5768505A (en) * 1995-12-19 1998-06-16 International Business Machines Corporation Object oriented mail server framework mechanism
US5796394A (en) * 1995-10-03 1998-08-18 Sony Corporation User interface and rule processing for a personal communications routing system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4106060A (en) * 1975-12-15 1978-08-08 Rca Corporation Electronic mail box
US5204939A (en) * 1989-12-14 1993-04-20 Fujitsu Limited Rule base processing system and rule evaluation control method therein
US5283856A (en) * 1991-10-04 1994-02-01 Beyond, Inc. Event-driven rule-based messaging system
US5555346A (en) * 1991-10-04 1996-09-10 Beyond Corporated Event-driven rule-based messaging system
US5675733A (en) * 1992-11-30 1997-10-07 International Business Machines Corporation Statistical analysis and display of reception status of electronic messages
US5619648A (en) * 1994-11-30 1997-04-08 Lucent Technologies Inc. Message filtering techniques
US5632011A (en) * 1995-05-22 1997-05-20 Sterling Commerce, Inc. Electronic mail management system for operation on a host computer system
US5796394A (en) * 1995-10-03 1998-08-18 Sony Corporation User interface and rule processing for a personal communications routing system
US5768505A (en) * 1995-12-19 1998-06-16 International Business Machines Corporation Object oriented mail server framework mechanism

Non-Patent Citations (20)

* Cited by examiner, † Cited by third party
Title
Amadi, A. O., "Automatic Filing and Retrievel of Offical Messages Using Global Mail Attributes and a Viewdata System with Symbollically Named Pages," Office Information Systems, pp. 11-18, Oct. 1988.
Amadi, A. O., Automatic Filing and Retrievel of Offical Messages Using Global Mail Attributes and a Viewdata System with Symbollically Named Pages, Office Information Systems, pp. 11 18, Oct. 1988. *
Ayre, R., "Evolving E-Mail: Will Client/Server Get the Message?," PC Magazine, vol. 10, No. 15, pp. 322-323, Sep. 10, 1991.
Ayre, R., Evolving E Mail: Will Client/Server Get the Message , PC Magazine, vol. 10, No. 15, pp. 322 323, Sep. 10, 1991. *
Berlind, D., "Don't Allow Rules of E-Mail to Get Broken," PC Week, vol. 12, No. 3, p. 55, Jan. 23, 1995.
Berlind, D., Don t Allow Rules of E Mail to Get Broken, PC Week, vol. 12, No. 3, p. 55, Jan. 23, 1995. *
Buyers Guide, "Choosing An E-Mail Package," PC User, No. 264, p. 31, Jul. 26, 1995.
Buyers Guide, Choosing An E Mail Package, PC User, No. 264, p. 31, Jul. 26, 1995. *
Kramer, M., "Mail Scout Motto: Filter E-Mail," PC Week, vol. 12, No. 23, p. 65, Jun. 12, 1995.
Kramer, M., Mail Scout Motto: Filter E Mail, PC Week, vol. 12, No. 23, p. 65, Jun. 12, 1995. *
Marshak, D. S., "Separating the Wheat from the Chaff," Patricia Seybold's Office Computing Report, vol. 13, No. 11, pp. 1-16, Nov. 1990.
Marshak, D. S., Separating the Wheat from the Chaff, Patricia Seybold s Office Computing Report, vol. 13, No. 11, pp. 1 16, Nov. 1990. *
Pollock, S., "A Rule-Based Message Filtering System," ACM Transactions on Office Information Systems, vol. 6, No. 3, pp. 232-254, Jul. 1988.
Pollock, S., A Rule Based Message Filtering System, ACM Transactions on Office Information Systems, vol. 6, No. 3, pp. 232 254, Jul. 1988. *
Rizzo, J., Macs to Achieve cc:Mail Parity, MacUser, vol. 11, No. 9, p. 109, Sep. 1995. *
Rosenberg, J., Everhart, C. F., and Borenstein, N. S., "An Overview of the Andrew Message System," Information Technology Center, Carnegie Mellon University, pp. 99-108, Jul. 1987.
Rosenberg, J., Everhart, C. F., and Borenstein, N. S., An Overview of the Andrew Message System, Information Technology Center, Carnegie Mellon University, pp. 99 108, Jul. 1987. *
Turner, L., Rules for Messaging, Network World, p. 65, Mar. 20, 1995. *
Willis, D., "Messaging Stand-Off--Lotus Notes 4.1 Battles Microsoft Exchange Server In A Clash Of Messaging Titans," Network Computing, p. 50, Jun. 15, 1996.
Willis, D., Messaging Stand Off Lotus Notes 4.1 Battles Microsoft Exchange Server In A Clash Of Messaging Titans, Network Computing, p. 50, Jun. 15, 1996. *

Cited By (1304)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040160629A1 (en) * 1996-11-21 2004-08-19 Ricoh Company, Ltd Method and system for automatically and transparently archiving documents and document meta data
US7684068B2 (en) * 1996-11-21 2010-03-23 Ricoh Company, Ltd. Method and system for automatically and transparently archiving documents and document meta data
US6411947B1 (en) * 1997-04-03 2002-06-25 Brightware Inc Automatic message interpretation and routing system
US20070005983A1 (en) * 1997-07-24 2007-01-04 Dickinson Robert D Iii E-mail firewall with stored key encryption/decryption
US8255683B2 (en) 1997-07-24 2012-08-28 Axway Inc. E-mail firewall with policy-based cryptosecurity
US8607042B2 (en) 1997-07-24 2013-12-10 Axway Inc. E-mail firewall with stored key encryption/decryption
USRE43302E1 (en) 1997-07-24 2012-04-03 Axway, Inc. E-mail firewall with stored key encryption/decryption
US20070245416A1 (en) * 1997-07-24 2007-10-18 Dickinson Robert D Iii E-mail firewall with stored key encryption/decryption
US20130061334A1 (en) * 1997-08-12 2013-03-07 Hoyt A. Fleming, III Method and system for filtering unauthorized electronic mail messages
USRE42702E1 (en) 1997-08-26 2011-09-13 Aol Inc. Method and system for filtering electronic messages
USRE41411E1 (en) 1997-08-26 2010-06-29 Aol Inc. Method and system for filtering electronic messages
US6334140B1 (en) * 1997-09-25 2001-12-25 Nec Corporation Electronic mail server in which electronic mail is processed
US6658456B1 (en) * 1997-09-29 2003-12-02 Panasonic Communications Co., Ltd. Electric mail transferring apparatus and electric mail transferring method
US20050193063A1 (en) * 1997-10-22 2005-09-01 Cannata Michael J. Web-based groupware system
US8412776B2 (en) 1997-10-22 2013-04-02 Open Text S.A. Web-based groupware system
US7734694B2 (en) 1997-10-22 2010-06-08 Brokercom Inc. Web-based groupware system
US7523162B2 (en) 1997-10-22 2009-04-21 Brokercom Inc. Web-based groupware system
US20080209345A1 (en) * 1997-10-22 2008-08-28 Cannata Michael J Web-based groupware system
US8176122B2 (en) 1997-10-22 2012-05-08 Open Text S.A. Web-based groupware system
US6385627B1 (en) * 1997-11-24 2002-05-07 International Business Machines Corporation Method, apparatus and computer program product for providing document user role indication
US9665559B2 (en) 1998-01-27 2017-05-30 Kinigos, Llc Word checking tool for selectively filtering text documents for undesirable or inappropriate content as a function of target audience
US20090006950A1 (en) * 1998-01-27 2009-01-01 Gross John N Document Distribution Control System and Method Based on Content
US7424674B1 (en) 1998-01-27 2008-09-09 Gross John N Document distribution control system and method based on content
US20040107089A1 (en) * 1998-01-27 2004-06-03 Gross John N. Email text checker system and method
US6782510B1 (en) 1998-01-27 2004-08-24 John N. Gross Word checking tool for controlling the language content in documents using dictionaries with modifyable status fields
US7185332B1 (en) 1998-03-25 2007-02-27 Symantec Corporation Multi-tiered incremental software updating
US6374302B1 (en) * 1998-03-31 2002-04-16 At&T Corp. Method and system to provide an action control point master gatekeeper
US6226630B1 (en) * 1998-07-22 2001-05-01 Compaq Computer Corporation Method and apparatus for filtering incoming information using a search engine and stored queries defining user folders
US6275850B1 (en) * 1998-07-24 2001-08-14 Siemens Information And Communication Networks, Inc. Method and system for management of message attachments
US6505237B2 (en) * 1998-07-24 2003-01-07 Siemens Information & Communication Networks, Inc. Method and system for management of message attachments
US6317751B1 (en) * 1998-09-28 2001-11-13 Merrill Lynch & Co., Inc. Compliance archival data process and system
US8782260B2 (en) 1998-10-09 2014-07-15 Mcafee, Inc. Network access control system and method using adaptive proxies
US6425002B1 (en) * 1998-11-23 2002-07-23 Motorola, Inc. Apparatus and method for handling dispatching messages for various applications of a communication device
US20150081820A1 (en) * 1999-03-11 2015-03-19 Easyweb Innovations, Inc. Message publishing with prohibited or restricted content removal
WO2000057285A1 (en) * 1999-03-19 2000-09-28 Zairmail, Inc. Distributed system for conducting physical delivery mail service over the internet
US20030110443A1 (en) * 1999-03-27 2003-06-12 Steve Yankovich Method and apparatus for programmatic learned routing in an electronic form system
US7000179B2 (en) * 1999-03-27 2006-02-14 Movaris, Inc. Method and apparatus for programmatic learned routing in an electronic form system
US20060291580A1 (en) * 1999-06-04 2006-12-28 Microsoft Corporation System for performing context-sensitive decisions about ideal communication modalities considering information about channel reliability
US7716532B2 (en) 1999-06-04 2010-05-11 Microsoft Corporation System for performing context-sensitive decisions about ideal communication modalities considering information about channel reliability
US7171000B1 (en) 1999-06-10 2007-01-30 Message Secure Corp. Simplified addressing for private communications
US20020101998A1 (en) * 1999-06-10 2002-08-01 Chee-Hong Wong Fast escrow delivery
US20020019932A1 (en) * 1999-06-10 2002-02-14 Eng-Whatt Toh Cryptographically secure network
US6466975B1 (en) * 1999-08-23 2002-10-15 Digital Connexxions Corp. Systems and methods for virtual population mutual relationship management using electronic computer driven networks
WO2001016695A1 (en) * 1999-09-01 2001-03-08 Katsikas Peter L System for eliminating unauthorized electronic mail
US6868498B1 (en) 1999-09-01 2005-03-15 Peter L. Katsikas System for eliminating unauthorized electronic mail
US8646043B2 (en) 1999-09-01 2014-02-04 Howell V Investments Limited Liability Company System for eliminating unauthorized electronic mail
US6999993B1 (en) * 1999-12-15 2006-02-14 Microsoft Corporation Methods and systems for end-users extensible electronic mail
US20010029499A1 (en) * 1999-12-30 2001-10-11 Tuatini Jeffrey Taihana Rules processing system
US20070094707A1 (en) * 2000-02-01 2007-04-26 Teleran Technologies, Inc. Rule Based Security Policy Enforcement
US7140035B1 (en) * 2000-02-01 2006-11-21 Teleran Technologies, Inc. Rule based security policy enforcement
US7822977B2 (en) 2000-02-08 2010-10-26 Katsikas Peter L System for eliminating unauthorized electronic mail
US20030191969A1 (en) * 2000-02-08 2003-10-09 Katsikas Peter L. System for eliminating unauthorized electronic mail
US8176531B2 (en) 2000-02-08 2012-05-08 Howell V Investments Limited Liability Company System for eliminating unauthorized electronic mail
US20050188045A1 (en) * 2000-02-08 2005-08-25 Katsikas Peter L. System for eliminating unauthorized electronic mail
US20110083166A1 (en) * 2000-02-08 2011-04-07 Katsikas Peter L System for eliminating unauthorized electronic mail
US7853989B2 (en) 2000-02-08 2010-12-14 Katsikas Peter L System for eliminating unauthorized electronic mail
US20110060802A1 (en) * 2000-02-08 2011-03-10 Katsikas Peter L System for eliminating unauthorized electronic mail
US7809791B2 (en) 2000-02-14 2010-10-05 Lockheed Martin Corporation Information aggregation, processing and distribution system
US7437408B2 (en) 2000-02-14 2008-10-14 Lockheed Martin Corporation Information aggregation, processing and distribution system
US20040111639A1 (en) * 2000-02-14 2004-06-10 Schwartz Michael I. Information aggregation, processing and distribution system
US20090094674A1 (en) * 2000-02-14 2009-04-09 Lockheed Martin Corporation Information aggregation, processing and distribution system
US20040193915A1 (en) * 2000-03-31 2004-09-30 Smith Jeffrey C. Policy enforcement in a secure data file delivery system
US8196183B2 (en) 2000-03-31 2012-06-05 Axway Inc. Policy enforcement in a secure data file delivery system
US10362063B2 (en) 2000-03-31 2019-07-23 Axway Inc. Policy enforcement in a secure data file delivery system
US20050223073A1 (en) * 2000-05-04 2005-10-06 Malik Dale W Attaching applets to messaging communications
US20090063648A1 (en) * 2000-05-04 2009-03-05 At&T Intellectual Property I, L.P. Viewing Attachments to Electronic Communications Via Pushing the Attachment to a Networked Viewing Site
US7398533B1 (en) * 2000-05-09 2008-07-08 Sun Microsystems, Inc. Remote function invocation with messaging in a distributed computing environment
US6741974B1 (en) * 2000-06-02 2004-05-25 Lockheed Martin Corporation Genetically programmed learning classifier system for complex adaptive system processing with agent-based architecture
AU2001267199B2 (en) * 2000-06-09 2008-04-17 Open Text Sa Ulc Web-based groupware system
US20110173342A1 (en) * 2000-06-16 2011-07-14 Mcafee, Inc. Method and apparatus for rate limiting
US8849993B2 (en) 2000-06-16 2014-09-30 Intel Corporation Method and apparatus for rate limiting
US8290768B1 (en) * 2000-06-21 2012-10-16 International Business Machines Corporation System and method for determining a set of attributes based on content of communications
US9584665B2 (en) 2000-06-21 2017-02-28 International Business Machines Corporation System and method for optimizing timing of responses to customer communications
US9699129B1 (en) 2000-06-21 2017-07-04 International Business Machines Corporation System and method for increasing email productivity
US8555374B2 (en) 2000-07-05 2013-10-08 Mcafee, Inc. High performance packet processing using a general purpose processor
US20020129238A1 (en) * 2000-07-07 2002-09-12 Eng-Whatt Toh Secure and reliable document delivery using routing lists
US20070294533A1 (en) * 2000-07-07 2007-12-20 Toh Eng W Secure and reliable document delivery using routing lists
US7251728B2 (en) * 2000-07-07 2007-07-31 Message Secure Corporation Secure and reliable document delivery using routing lists
US7596689B2 (en) * 2000-07-07 2009-09-29 Perimeter Esecurity Secure and reliable document delivery using routing lists
US6981252B1 (en) 2000-07-14 2005-12-27 Symantec Corporation Method and apparatus for automatically uninstalling software on a network
US7127486B1 (en) 2000-07-24 2006-10-24 Vignette Corporation Method and system for facilitating marketing dialogues
WO2002008938A3 (en) * 2000-07-24 2003-12-24 Vignette Corp Method and system for managing message pacing
US20080000812A1 (en) * 2000-07-24 2008-01-03 Brian Reistad Method and system for facilitating marketing dialogues
US9419934B2 (en) 2000-07-24 2016-08-16 Open Text S.A. Method and system for message pacing
US8065375B2 (en) 2000-07-24 2011-11-22 Vignette Software Llc Method and system for message pacing
US8386578B2 (en) * 2000-07-24 2013-02-26 Open Text S.A. Method and system for message pacing
US9853936B2 (en) 2000-07-24 2017-12-26 Open Text Sa Ulc Method and system for message pacing
WO2002008938A2 (en) * 2000-07-24 2002-01-31 Vignette Corporation Method and system for managing message pacing
US20060136545A1 (en) * 2000-07-24 2006-06-22 Brian Reistad Method and system for facilitating marketing dialogues
US7975007B2 (en) 2000-07-24 2011-07-05 Vignette Software Llc Method and system for facilitating marketing dialogues
US8260870B2 (en) * 2000-07-24 2012-09-04 Open Text S.A. Method and system for message pacing
US20110282956A1 (en) * 2000-07-24 2011-11-17 Brian Reistad Method and System for Message Pacing
US8255460B2 (en) 2000-07-24 2012-08-28 Open Text S.A. Method and system for providing personalized network based marketing dialogues
US8234334B2 (en) 2000-07-24 2012-07-31 Open Text S.A. Method and system for facilitating marketing dialogues
US9118615B2 (en) 2000-07-24 2015-08-25 Open Text S.A. Method and system for providing personalized network based marketing dialogues
US20090313328A1 (en) * 2000-07-24 2009-12-17 Vignette Corporation Method and system for facilitating marketing dialogues
US8805945B2 (en) 2000-07-24 2014-08-12 Open Text S.A. Method and system for message pacing
US7389320B2 (en) 2000-07-24 2008-06-17 Vignette Corporation Method and system for facilitating marketing dialogues
US10263942B2 (en) 2000-07-24 2019-04-16 Open Text Sa Ulc Method and system for providing personalized network based dialogues
US9515979B2 (en) 2000-07-24 2016-12-06 Open Text Sa Ulc Method and system for providing personalized network based dialogues
US7647372B2 (en) 2000-07-24 2010-01-12 Vignette Corporation Method and system for facilitating marketing dialogues
US20100017492A1 (en) * 2000-07-24 2010-01-21 Brian Reistad Method and system for message pacing
US6732185B1 (en) * 2000-07-24 2004-05-04 Vignette Corporation Method and system for managing message pacing
US20100050091A1 (en) * 2000-07-24 2010-02-25 Vignette Corporation Method and system for facilitating marketing dialogues
US20020026485A1 (en) * 2000-07-26 2002-02-28 Kazuhiro Sugawara Communicating apparatus and communicating method
WO2002013489A2 (en) * 2000-08-08 2002-02-14 Tumbleweed Communications Corp. Recipient-specified automated processing in a secure data file delivery system
WO2002013489A3 (en) * 2000-08-08 2003-01-09 Tumbleweed Comm Corp Recipient-specified automated processing in a secure data file delivery system
US8156192B2 (en) 2000-08-28 2012-04-10 Brown Scott T E-mail messaging system and method for enhanced rich media delivery
WO2002019146A1 (en) * 2000-08-28 2002-03-07 Brown Scott T E-mail messaging system and method for enhanced rich media delivery
US20100049812A1 (en) * 2000-08-28 2010-02-25 Brown Scott T E-Mail Messaging System and Method for Enhanced Rich Media Delivery
US20110225253A1 (en) * 2000-08-28 2011-09-15 Brown Scott T E-mail messaging system and method for enhanced rich media delivery
US20020078158A1 (en) * 2000-08-28 2002-06-20 Brown Scott T. E-mail messaging system and method for enhanced rich media delivery
US7970843B2 (en) 2000-08-28 2011-06-28 Brown Scott T E-mail messaging system and method for enhanced rich media delivery
US8312093B2 (en) 2000-08-28 2012-11-13 Brown Scott T E-mail messaging system and method for enhanced rich media delivery
US7584251B2 (en) 2000-08-28 2009-09-01 Brown Scott T E-mail messaging system and method for enhanced rich media delivery
EP1193925A3 (en) * 2000-09-21 2003-01-22 Siemens Information and Communication Networks Inc. Processing electronic messages
EP1193925A2 (en) * 2000-09-21 2002-04-03 Siemens Information and Communication Networks Inc. Processing electronic messages
US7958213B1 (en) 2000-09-21 2011-06-07 Siemens Enterprise Communications, Inc. Processing electronic messages
US20020042815A1 (en) * 2000-09-22 2002-04-11 Arthur Salzfass Automated system and method for routing undeliverable e-mail messages and otherwise managing e-mail
EP1783973B1 (en) * 2000-09-29 2011-09-28 Google Inc. Value-added electronic messaging services and transparent implementation thereof using an intermediate server
EP1783973A2 (en) * 2000-09-29 2007-05-09 Postini, Inc. Value-added electronic messaging services and transparent implementation thereof using intermediate server
US6725228B1 (en) * 2000-10-31 2004-04-20 David Morley Clark System for managing and organizing stored electronic messages
US20040199529A1 (en) * 2000-10-31 2004-10-07 Caelo Software Inc. System for managing and organizing stored electronic messages
US20110208653A1 (en) * 2000-11-01 2011-08-25 Buyerleverage Email Solutions Llc System and method for granting deposit-contingent e-mailing rights
US20080172717A1 (en) * 2000-11-08 2008-07-17 Peter Malcolm Information Management System
EP1378847A1 (en) * 2000-11-08 2004-01-07 Orchestria Limited An Information management system
US20050204172A1 (en) * 2000-11-08 2005-09-15 Orchestria Limited Information management system
US20050203855A1 (en) * 2000-11-08 2005-09-15 Orchestria Limited Information management system
EP1365340B1 (en) * 2000-11-08 2008-01-09 Orchestria Limited An information management system
US9225553B2 (en) 2000-11-08 2015-12-29 Ca, Inc. Information management system
US20080301761A1 (en) * 2000-11-08 2008-12-04 Peter Bryan Malcolm Information Management System
US7333956B2 (en) 2000-11-08 2008-02-19 Orchestria Limited Information management system
US20080301762A1 (en) * 2000-11-08 2008-12-04 Peter Malcolm Information Management System
EP1369801B1 (en) * 2000-11-08 2007-11-07 Orchestria Limited An information management system
US7945519B2 (en) 2000-11-08 2011-05-17 Computer Associates Think, Inc. Information management system
US20040078334A1 (en) * 2000-11-08 2004-04-22 Malcolm Peter Bryan Information management system
US8219815B2 (en) 2000-11-08 2012-07-10 Ca, Inc. Information management system
US20080301454A1 (en) * 2000-11-08 2008-12-04 Peter Bryan Malcolm Information Management System
US7685626B2 (en) 2000-11-08 2010-03-23 Computer Associates Think, Inc. Information management system
US7797240B2 (en) 2000-11-08 2010-09-14 Computer Associates Think, Inc. Information management system
US20080300904A1 (en) * 2000-11-08 2008-12-04 Peter Malcolm Information Management System
US7908224B2 (en) 2000-11-08 2011-03-15 Computer Associates Think, Inc. Information management system
EP1376435A3 (en) * 2000-11-08 2004-01-07 Orchestria Limited An information management system
US9203650B2 (en) * 2000-11-08 2015-12-01 Ca, Inc. Information management system
EP1376436A1 (en) * 2000-11-08 2004-01-02 Orchestria Limited An information management system
EP1376435A2 (en) * 2000-11-08 2004-01-02 Orchestria Limited An information management system
EP1365340A2 (en) * 2000-11-08 2003-11-26 Orchestria Limited An information management system
US20080162225A1 (en) * 2000-11-08 2008-07-03 Peter Malcolm Information Management System
US7669227B2 (en) 2000-11-08 2010-02-23 Computer Associates Think, Inc. Information management system
US20050216771A1 (en) * 2000-11-08 2005-09-29 Orchestria Limited Information management system
US7836482B2 (en) 2000-11-08 2010-11-16 Computer Associates Think, Inc. Information management system
US20080301297A1 (en) * 2000-11-08 2008-12-04 Peter Bryan Malcolm Information Management System
US6778941B1 (en) * 2000-11-14 2004-08-17 Qualia Computing, Inc. Message and user attributes in a message filtering method and system
US7444382B2 (en) 2000-11-30 2008-10-28 At&T Intellectual Property I, L.P. Method and apparatus for minimizing storage of common attachment files in an e-mail communications server
US7908332B2 (en) 2000-11-30 2011-03-15 At&T Intellectual Property I, L.P. Method and apparatus for minimizing storage of common attachment files in an e-mail communications server
US20060095527A1 (en) * 2000-11-30 2006-05-04 Malik Dale W Method and apparatus for minimzing storage of common attachment files in an e-mail communications server
US20020065892A1 (en) * 2000-11-30 2002-05-30 Malik Dale W. Method and apparatus for minimizing storage of common attachment files in an e-mail communications server
US7003551B2 (en) * 2000-11-30 2006-02-21 Bellsouth Intellectual Property Corp. Method and apparatus for minimizing storage of common attachment files in an e-mail communications server
US7634736B2 (en) 2000-12-01 2009-12-15 Microsoft Corporation Dynamic controlling attribute-specific list for improved object organization
US6732155B2 (en) * 2000-12-01 2004-05-04 Microsoft Corporation Dynamic controlling of attribute-specific list for improved object organization
US20020095464A1 (en) * 2000-12-01 2002-07-18 Meek Christopher A. Dynamic controlling of attribute-specific list for improved object organization
US20040177123A1 (en) * 2000-12-01 2004-09-09 Meek Christopher A. Dynamic controlling attribute-specific list for improved object organization
US9083666B2 (en) * 2000-12-29 2015-07-14 Facebook, Inc. Message screening system utilizing supervisory screening and approval
US9621501B2 (en) 2000-12-29 2017-04-11 Facebook, Inc. Message screening system utilizing supervisory screening and approval
US8776222B2 (en) * 2000-12-29 2014-07-08 Facebook, Inc. Message screening system
US20120110104A1 (en) * 2000-12-29 2012-05-03 Aol Llc Message screening system
WO2002054656A2 (en) * 2001-01-05 2002-07-11 Viquity Corporation Use of time-stamps and digital signatures
WO2002054656A3 (en) * 2001-01-05 2002-12-12 Viquity Corp Use of time-stamps and digital signatures
US20020091774A1 (en) * 2001-01-08 2002-07-11 Kokoro Imamura Method and system for retrieving electronic mail for a plurality of users over a single device
EP1223526A1 (en) * 2001-01-10 2002-07-17 Hewlett-Packard Company, A Delaware Corporation Improved process and apparatus for email handling
US20020107928A1 (en) * 2001-01-10 2002-08-08 Denis Chalon Process and apparatus for email handling
US20020133624A1 (en) * 2001-01-16 2002-09-19 Tony Hashem System and process for routing information in a data processing system
US20020116499A1 (en) * 2001-02-16 2002-08-22 Microsoft Corporation, Method and system for using one form to send a message using multiple transports
US7013350B2 (en) * 2001-02-16 2006-03-14 Microsoft Corporation System setting flags based on address types in destination address field of a message to indicate different transports to deliver the message
US8838714B2 (en) 2001-02-20 2014-09-16 Mcafee, Inc. Unwanted e-mail filtering system including voting feedback
WO2002069108A3 (en) * 2001-02-26 2002-10-24 Eprivacy Group Inc System and method for controlling distribution of network communications
US7543036B2 (en) 2001-02-26 2009-06-02 Symantec Corporation System and method for controlling distribution of network communications
US20020120705A1 (en) * 2001-02-26 2002-08-29 Schiavone Vincent J. System and method for controlling distribution of network communications
US7634545B2 (en) 2001-02-26 2009-12-15 Symantec Corporation System and method for controlling distribution of network communications
US7571214B2 (en) 2001-02-26 2009-08-04 Symantec Corporation System and method for controlling distribution of network communications
US7647411B1 (en) 2001-02-26 2010-01-12 Symantec Corporation System and method for controlling distribution of network communications
WO2002069108A2 (en) * 2001-02-26 2002-09-06 Eprivacy Group, Inc. System and method for controlling distribution of network communications
US20020120600A1 (en) * 2001-02-26 2002-08-29 Schiavone Vincent J. System and method for rule-based processing of electronic mail messages
US7415504B2 (en) * 2001-02-26 2008-08-19 Symantec Corporation System and method for controlling distribution of network communications
US20080016174A1 (en) * 2001-02-26 2008-01-17 Symantec Corporation System and method for controlling distribution of network communications
US8468256B1 (en) 2001-03-08 2013-06-18 Mcafee, Inc. Automatically configuring a computer firewall based on network connection
US20020161862A1 (en) * 2001-03-15 2002-10-31 Horvitz Eric J. System and method for identifying and establishing preferred modalities or channels for communications based on participants' preferences and contexts
US8166178B2 (en) 2001-03-15 2012-04-24 Microsoft Corporation Representation, decision models, and user interface for encoding managing preferences, and performing automated decision making about the timing and modalities of interpersonal communications
US8402148B2 (en) 2001-03-15 2013-03-19 Microsoft Corporation Representation, decision models, and user interface for encoding managing preferences, and performing automated decision making about the timing and modalities of interpersonal communications
US7389351B2 (en) 2001-03-15 2008-06-17 Microsoft Corporation System and method for identifying and establishing preferred modalities or channels for communications based on participants' preferences and contexts
US20050193102A1 (en) * 2001-03-15 2005-09-01 Microsoft Corporation System and method for identifying and establishing preferred modalities or channels for communications based on participants' preferences and contexts
US8161165B2 (en) 2001-03-15 2012-04-17 Microsoft Corporation Representation, decision models, and user interface for encoding managing preferences, and performing automated decision making about the timing and modalities of interpersonal communications
US20080140776A1 (en) * 2001-03-15 2008-06-12 Microsoft Corporation Representation, decision models, and user interface for encoding managing preferences, and performing automated decision making about the timing and modalities of interpersonal communications
US20080104517A1 (en) * 2001-03-15 2008-05-01 Microsoft Corporation Representation, decision models, and user interface for encoding managing preferences, and performing automated decision making about the timing and modalities of interpersonal communications
US20080134069A1 (en) * 2001-03-15 2008-06-05 Microsoft Corporation Representation, decision models, and user interface for encoding managing preferences, and performing automated decision making about the timing and modalities of interpersonal communications
US9948644B2 (en) 2001-03-26 2018-04-17 Salesforce.Com, Inc. Routing messages between applications
US20030041178A1 (en) * 2001-03-26 2003-02-27 Lev Brouk System and method for routing messages between applications
US9588828B2 (en) 2001-03-26 2017-03-07 Salesforce.Com, Inc. System and method for routing messages between applications
US8639843B2 (en) 2001-03-26 2014-01-28 Salesforce.Com, Inc. System and method for routing messages between applications
US7516191B2 (en) 2001-03-26 2009-04-07 Salesforce.Com, Inc. System and method for invocation of services
US9491126B2 (en) 2001-03-26 2016-11-08 Salesforce.Com, Inc. Routing messages between applications
US7788399B2 (en) 2001-03-26 2010-08-31 Salesforce.Com, Inc. System and method for mapping of services
US7689711B2 (en) * 2001-03-26 2010-03-30 Salesforce.Com, Inc. System and method for routing messages between applications
US9467405B2 (en) 2001-03-26 2016-10-11 Salesforce.Com, Inc. Routing messages between applications
US20030018808A1 (en) * 2001-03-26 2003-01-23 Lev Brouk System and method for mapping of services
US20030053459A1 (en) * 2001-03-26 2003-03-20 Lev Brouk System and method for invocation of services
US7249195B2 (en) 2001-03-30 2007-07-24 Minor Ventures, Llc Apparatus and methods for correlating messages sent between services
US9037726B2 (en) 2001-03-30 2015-05-19 Salesforce.Com, Inc. Apparatus and methods for managing messages sent between services
US20080016242A1 (en) * 2001-03-30 2008-01-17 Minor Ventures, Llc Apparatus and methods for managing messages sent between services
US20040167987A1 (en) * 2001-03-30 2004-08-26 Grand Central Communications, Inc. Apparatus and methods for provisioning services
US11070626B2 (en) 2001-03-30 2021-07-20 Salesforce.Com, Inc. Managing messages sent between services
US20040186891A1 (en) * 2001-03-30 2004-09-23 Grand Central Communications, Inc. Apparatus and methods for correlating messages sent between services
US7305454B2 (en) 2001-03-30 2007-12-04 Minor Ventures, Llc. Apparatus and methods for provisioning services
US20020156850A1 (en) * 2001-04-24 2002-10-24 Walter Hamscher Negotiating agreements
US6950854B2 (en) * 2001-06-07 2005-09-27 Eacceleration Software Dial back e-mail system using binary protocol
US20020188687A1 (en) * 2001-06-07 2002-12-12 Acceleration Software International Corporation Dial back E-mail system using binary protocol
US20060020675A1 (en) * 2001-06-07 2006-01-26 Acceleration Software International Corporation, (A Washington Corporation) Dial back-mail system using binary protocol
US8949976B2 (en) 2001-06-15 2015-02-03 Mcafee Inc. Scanning computer files for specified content
US9866585B2 (en) 2001-06-15 2018-01-09 Mcafee, Llc Scanning computer files for specified content
US20080270789A1 (en) * 2001-06-22 2008-10-30 Tumbleweed Communications Corp. Method and system for messaging security
US8407780B2 (en) 2001-06-22 2013-03-26 Axway Inc. Method and system for messaging security
US10116621B2 (en) 2001-06-22 2018-10-30 Axway Inc. Method and system for messaging security
US8819306B2 (en) 2001-08-24 2014-08-26 Intel Corporation General input/output architecture with PCI express protocol with credit-based flow control
US8621077B2 (en) 2001-09-21 2013-12-31 Mcafee, Inc. Distribution of security policies for small to medium-sized organizations
US8776230B1 (en) 2001-10-02 2014-07-08 Mcafee, Inc. Master security policy server
US10193928B2 (en) 2001-10-02 2019-01-29 Mcafee, Llc Master security policy server
US10038720B2 (en) 2001-10-02 2018-07-31 Mcafee, Llc Master security policy server
EP1444612A4 (en) * 2001-11-13 2006-05-03 Lockheed Corp Information aggregation, processing and distribution system
US20040103147A1 (en) * 2001-11-13 2004-05-27 Flesher Kevin E. System for enabling collaboration and protecting sensitive data
EP1444612A1 (en) * 2001-11-13 2004-08-11 Lockheed Martin Corporation Information aggregation, processing and distribution system
US20030097427A1 (en) * 2001-11-21 2003-05-22 Parry Travis J. Multiple device configuration and upgrade for imaging devices
US20030101065A1 (en) * 2001-11-27 2003-05-29 International Business Machines Corporation Method and apparatus for maintaining conversation threads in electronic mail
US20030131063A1 (en) * 2001-12-19 2003-07-10 Breck David L. Message processor
US9876818B2 (en) 2001-12-20 2018-01-23 McAFEE, LLC. Embedded anti-virus scanner for a network adapter
US9055098B2 (en) 2001-12-20 2015-06-09 Mcafee, Inc. Embedded anti-virus scanner for a network adapter
US8627443B2 (en) 2001-12-20 2014-01-07 Mcafee, Inc. Network adapter firewall system and method
US8271631B1 (en) 2001-12-21 2012-09-18 Microsoft Corporation Methods, tools, and interfaces for the dynamic assignment of people to groups to enable enhanced communication and collaboration
US7644144B1 (en) 2001-12-21 2010-01-05 Microsoft Corporation Methods, tools, and interfaces for the dynamic assignment of people to groups to enable enhanced communication and collaboration
US7747719B1 (en) 2001-12-21 2010-06-29 Microsoft Corporation Methods, tools, and interfaces for the dynamic assignment of people to groups to enable enhanced communication and collaboration
US8989728B2 (en) 2002-01-08 2015-03-24 Seven Networks, Inc. Connection architecture for a mobile network
US8127342B2 (en) 2002-01-08 2012-02-28 Seven Networks, Inc. Secure end-to-end transport through intermediary nodes
US8811952B2 (en) 2002-01-08 2014-08-19 Seven Networks, Inc. Mobile device power management in data synchronization over a mobile network with or without a trigger notification
US8549587B2 (en) 2002-01-08 2013-10-01 Seven Networks, Inc. Secure end-to-end transport through intermediary nodes
US8661126B2 (en) 2002-01-15 2014-02-25 Mcafee, Inc. System and method for network vulnerability detection and reporting
US8700767B2 (en) 2002-01-15 2014-04-15 Mcafee, Inc. System and method for network vulnerability detection and reporting
US8615582B2 (en) 2002-01-15 2013-12-24 Mcafee, Inc. System and method for network vulnerability detection and reporting
US8621060B2 (en) 2002-01-15 2013-12-31 Mcafee, Inc. System and method for network vulnerability detection and reporting
US20030145058A1 (en) * 2002-01-29 2003-07-31 Yuan-Chau Chan System and method for managing mail and file
US7024458B2 (en) * 2002-01-29 2006-04-04 Inventec Corporation System and method for managing mail and file
US20060251068A1 (en) * 2002-03-08 2006-11-09 Ciphertrust, Inc. Systems and Methods for Identifying Potentially Malicious Messages
US8578480B2 (en) 2002-03-08 2013-11-05 Mcafee, Inc. Systems and methods for identifying potentially malicious messages
US8549611B2 (en) 2002-03-08 2013-10-01 Mcafee, Inc. Systems and methods for classification of messaging entities
US8561167B2 (en) 2002-03-08 2013-10-15 Mcafee, Inc. Web reputation scoring
US7110399B2 (en) * 2002-03-28 2006-09-19 International Business Machines Corporation System and method for redirecting network addresses for deferred rendering
US20030185197A1 (en) * 2002-03-28 2003-10-02 International Business Machines Corporation System and method for redirecting network addresses for deferred rendering
US8656502B2 (en) 2002-04-04 2014-02-18 Mcafee, Inc. Controlling use of a computer program installed on a computer
US7155578B2 (en) 2002-04-05 2006-12-26 Genworth Financial, Inc. Method and system for transferring files using file transfer protocol
US20030191811A1 (en) * 2002-04-05 2003-10-09 Tony Hashem Method and system for transferring files using file transfer protocol
US20030190909A1 (en) * 2002-04-08 2003-10-09 Akimasa Matsushita Electronic mail receipt processing method and portable communication apparatus for practicing the same
US20060095921A9 (en) * 2002-04-23 2006-05-04 International Business Machines Corporation Object-oriented framework for document routing service in a content management system
US7032225B2 (en) 2002-04-23 2006-04-18 International Business Machines Corporation Object-oriented framework for document routing service in a content management system
US20030204646A1 (en) * 2002-04-23 2003-10-30 International Business Machines Corporation Object-oriented framework for document routing service in a content management system
US20040054914A1 (en) * 2002-04-30 2004-03-18 Sullivan Patrick L. Method and apparatus for in-line serial data encryption
US7650510B2 (en) * 2002-04-30 2010-01-19 General Dynamics Advanced Information Systems, Inc. Method and apparatus for in-line serial data encryption
US8510839B2 (en) 2002-05-10 2013-08-13 Mcafee, Inc. Detecting malware carried by an E-mail message
US20110173677A1 (en) * 2002-05-10 2011-07-14 Mcafee, Inc., A Delaware Corporation Detecting malware carried by an e-mail message
US8249060B1 (en) 2002-06-28 2012-08-21 Microsoft Corporation Metadata schema for interpersonal communications management systems
US7870240B1 (en) 2002-06-28 2011-01-11 Microsoft Corporation Metadata schema for interpersonal communications management systems
US8954578B2 (en) 2002-07-26 2015-02-10 Mcafee Inc. System and method for heuristic determination of network protocols
US9998478B2 (en) 2002-08-27 2018-06-12 Mcafee, Llc Enterprise-wide security for computer devices
US8850530B2 (en) 2002-08-27 2014-09-30 Mcafee, Inc. Enterprise-wide security system for computer devices
US8341693B2 (en) 2002-08-27 2012-12-25 Mcafee, Inc. Enterprise-wide security system for computer devices
US20110162049A1 (en) * 2002-08-27 2011-06-30 Mcafee, Inc., A Delaware Corporation Enterprise-wide security system for computer devices
US8661498B2 (en) * 2002-09-18 2014-02-25 Symantec Corporation Secure and scalable detection of preselected data embedded in electronically transmitted messages
US20100083377A1 (en) * 2002-09-18 2010-04-01 Rowney Kevin T Method and apparatus to define the scope of a search for information from a tabular data source
US20100332481A1 (en) * 2002-09-18 2010-12-30 Rowney Kevin T Secure and scalable detection of preselected data embedded in electronically transmitted messages
US8225371B2 (en) * 2002-09-18 2012-07-17 Symantec Corporation Method and apparatus for creating an information security policy based on a pre-configured template
US8312553B2 (en) 2002-09-18 2012-11-13 Symantec Corporation Mechanism to search information content for preselected data
US7472114B1 (en) 2002-09-18 2008-12-30 Symantec Corporation Method and apparatus to define the scope of a search for information from a tabular data source
US7673344B1 (en) 2002-09-18 2010-03-02 Symantec Corporation Mechanism to search information content for preselected data
US20050086252A1 (en) * 2002-09-18 2005-04-21 Chris Jones Method and apparatus for creating an information security policy based on a pre-configured template
US7886359B2 (en) 2002-09-18 2011-02-08 Symantec Corporation Method and apparatus to report policy violations in messages
US9515998B2 (en) * 2002-09-18 2016-12-06 Symantec Corporation Secure and scalable detection of preselected data embedded in electronically transmitted messages
US20090106205A1 (en) * 2002-09-18 2009-04-23 Rowney Kevin T Method and apparatus to define the scope of a search for information from a tabular data source
US20140208421A1 (en) * 2002-09-18 2014-07-24 Symantec Corporation Secure and scalable detection of preselected data embedded in electronically transmitted messages
US7996385B2 (en) 2002-09-18 2011-08-09 Symantec Corporation Method and apparatus to define the scope of a search for information from a tabular data source
US8566305B2 (en) 2002-09-18 2013-10-22 Symantec Corporation Method and apparatus to define the scope of a search for information from a tabular data source
US20110099638A1 (en) * 2002-09-18 2011-04-28 Chris Jones Method and apparatus to report policy violations in messages
US20090300770A1 (en) * 2002-09-18 2009-12-03 Rowney Kevin T Mechanism to search information content for preselected data
US20120266210A1 (en) * 2002-09-18 2012-10-18 Symantec Corporation Method and apparatus for creating an information security policy based on a pre-configured template
US8813176B2 (en) * 2002-09-18 2014-08-19 Symantec Corporation Method and apparatus for creating an information security policy based on a pre-configured template
US8595849B2 (en) 2002-09-18 2013-11-26 Symantec Corporation Method and apparatus to report policy violations in messages
US20050027723A1 (en) * 2002-09-18 2005-02-03 Chris Jones Method and apparatus to report policy violations in messages
US8631124B2 (en) 2002-11-13 2014-01-14 Mcafee, Inc. Network analysis system and method utilizing collected metadata
US7308648B1 (en) * 2002-11-27 2007-12-11 Microsoft Corporation Method, system, and computer-readable medium for filtering harmful HTML in an electronic document
US8732245B2 (en) * 2002-12-03 2014-05-20 Blackberry Limited Method, system and computer software product for pre-selecting a folder for a message
US20060026236A1 (en) * 2002-12-03 2006-02-02 Research In Motion Limited Method, system and computer software product for pre-selecting a folder for a message
US20040133699A1 (en) * 2002-12-04 2004-07-08 Tony Hashem System and method for performing data transfer
US7209953B2 (en) 2002-12-12 2007-04-24 Mark Brooks E-mail system using attachment identifier generated at issuer device for retrieving appropriate file version from e-mail's issuer
US20040117765A1 (en) * 2002-12-16 2004-06-17 Ming Chan System and method for evaluating and executing hierarchies of rules
US7065745B2 (en) 2002-12-16 2006-06-20 Sun Microsystems, Inc. System and method for evaluating and executing hierarchies of rules
USRE45558E1 (en) 2002-12-30 2015-06-09 Facebook, Inc. Supervising user interaction with online services
US20040128498A1 (en) * 2002-12-31 2004-07-01 Pitney Bowes Inc. System and method for message filtering by a trusted third party
US11188978B2 (en) 2002-12-31 2021-11-30 Ebay Inc. Method and system to generate a listing in a network-based commerce system
US7500096B2 (en) 2002-12-31 2009-03-03 Pitney Bowes Inc. System and method for message filtering by a trusted third party
US9251193B2 (en) 2003-01-08 2016-02-02 Seven Networks, Llc Extending user relationships
US7725544B2 (en) 2003-01-24 2010-05-25 Aol Inc. Group based spam classification
WO2004068287A2 (en) * 2003-01-24 2004-08-12 America Online, Inc. Group based spam classification
US20040148330A1 (en) * 2003-01-24 2004-07-29 Joshua Alspector Group based spam classification
US8504627B2 (en) 2003-01-24 2013-08-06 Bright Sun Technologies Group based spam classification
WO2004068287A3 (en) * 2003-01-24 2005-02-24 America Online Inc Group based spam classification
US20060190481A1 (en) * 2003-01-24 2006-08-24 Aol Llc Classifier Tuning Based On Data Similarities
US7620691B1 (en) 2003-02-10 2009-11-17 Aol Llc Filtering electronic messages while permitting delivery of solicited electronics messages
US8793763B2 (en) 2003-02-14 2014-07-29 Preventsys, Inc. System and method for interfacing with heterogeneous network data gathering tools
US8789140B2 (en) 2003-02-14 2014-07-22 Preventsys, Inc. System and method for interfacing with heterogeneous network data gathering tools
US9094434B2 (en) 2003-02-14 2015-07-28 Mcafee, Inc. System and method for automated policy audit and remediation management
US20050015622A1 (en) * 2003-02-14 2005-01-20 Williams John Leslie System and method for automated policy audit and remediation management
US8561175B2 (en) 2003-02-14 2013-10-15 Preventsys, Inc. System and method for automated policy audit and remediation management
US20040162879A1 (en) * 2003-02-14 2004-08-19 Microsoft Corporation Method, apparatus, and user interface for managing electronic mail and alert messages
US7467183B2 (en) * 2003-02-14 2008-12-16 Microsoft Corporation Method, apparatus, and user interface for managing electronic mail and alert messages
US8627466B2 (en) 2003-03-13 2014-01-07 Mcafee, Inc. Alert message control of security mechanisms in data processing systems
US20050021540A1 (en) * 2003-03-26 2005-01-27 Microsoft Corporation System and method for a rules based engine
US20040205136A1 (en) * 2003-03-28 2004-10-14 Kevin Whittenberger Document message state management engine
US20040194112A1 (en) * 2003-03-28 2004-09-30 Microsoft Corporation Entity linking system
US7614057B2 (en) 2003-03-28 2009-11-03 Microsoft Corporation Entity linking system
US8112481B2 (en) * 2003-03-28 2012-02-07 Microsoft Corporation Document message state management engine
US8549635B2 (en) 2003-04-01 2013-10-01 Mcafee, Inc. Malware detection using external call characteristics
WO2004088447A3 (en) * 2003-04-04 2005-02-17 Emedia It Cc A digital e-mail certificate
WO2004088447A2 (en) * 2003-04-04 2004-10-14 Emedia It Cc A digital e-mail certificate
US7373519B1 (en) 2003-04-09 2008-05-13 Symantec Corporation Distinguishing legitimate modifications from malicious modifications during executable computer file modification analysis
US9667583B2 (en) 2003-04-18 2017-05-30 Aol Inc. Sorting electronic messages using attributes of the sender address
US8285803B2 (en) 2003-04-18 2012-10-09 Aol Inc. Sorting electronic messages using attributes of the sender address
US20090182830A1 (en) * 2003-04-18 2009-07-16 Aol Llc Sorting electronic messages using attributes of the sender address
US9100358B2 (en) 2003-04-18 2015-08-04 Aol Inc. Sorting electronic messages using attributes of the sender address
US8601111B2 (en) 2003-04-18 2013-12-03 Aol Inc. Sorting electronic messages using attributes of the sender address
US20110185028A1 (en) * 2003-04-18 2011-07-28 Aol Inc. Sorting electronic messages using attributes of the sender address
US7945633B2 (en) 2003-04-18 2011-05-17 Aol Inc. Sorting electronic messages using attributes of the sender address
US20040215610A1 (en) * 2003-04-22 2004-10-28 Lawson Software, Inc. System and method for extracting and applying business organization information
US10185479B2 (en) 2003-05-05 2019-01-22 Sonicwall Inc. Declassifying of suspicious messages
US8977696B2 (en) 2003-05-05 2015-03-10 Sonicwall, Inc. Declassifying of suspicious messages
US7546348B2 (en) * 2003-05-05 2009-06-09 Sonicwall, Inc. Message handling with selective user participation
US20040236839A1 (en) * 2003-05-05 2004-11-25 Mailfrontier, Inc. Message handling with selective user participation
US8285804B2 (en) 2003-05-05 2012-10-09 Sonicwall, Inc. Declassifying of suspicious messages
US20110238765A1 (en) * 2003-05-05 2011-09-29 Wilson Brian K Declassifying of Suspicious Messages
US7925707B2 (en) 2003-05-05 2011-04-12 Sonicwall, Inc. Declassifying of suspicious messages
US20080133686A1 (en) * 2003-05-05 2008-06-05 Mailfrontier, Inc. Message Handling With Selective User Participation
US8751506B2 (en) 2003-05-06 2014-06-10 Symantec Corporation Personal computing device-based mechanism to detect preselected data
US20040225645A1 (en) * 2003-05-06 2004-11-11 Rowney Kevin T. Personal computing device -based mechanism to detect preselected data
US8041719B2 (en) 2003-05-06 2011-10-18 Symantec Corporation Personal computing device-based mechanism to detect preselected data
US9037660B2 (en) 2003-05-09 2015-05-19 Google Inc. Managing electronic messages
US7590695B2 (en) 2003-05-09 2009-09-15 Aol Llc Managing electronic messages
US20090307326A1 (en) * 2003-05-09 2009-12-10 Aol Llc Managing electronic messages
US8073916B2 (en) 2003-05-09 2011-12-06 Aol Inc. Managing electronic messages
US20050055410A1 (en) * 2003-05-09 2005-03-10 Landsman Richard A. Managing electronic messages
US9576271B2 (en) 2003-06-24 2017-02-21 Google Inc. System and method for community centric resource sharing based on a publishing subscription model
US9715678B2 (en) 2003-06-26 2017-07-25 Microsoft Technology Licensing, Llc Side-by-side shared calendars
US9098837B2 (en) 2003-06-26 2015-08-04 Microsoft Technology Licensing, Llc Side-by-side shared calendars
US10482429B2 (en) 2003-07-01 2019-11-19 Microsoft Technology Licensing, Llc Automatic grouping of electronic mail
US8799808B2 (en) 2003-07-01 2014-08-05 Microsoft Corporation Adaptive multi-line view user interface
US7627635B1 (en) 2003-07-28 2009-12-01 Aol Llc Managing self-addressed electronic messages
EP1536602A3 (en) * 2003-08-06 2010-12-01 NEC Corporation Electronic communication device, method and program for receiving email by electronic communication device
US20080288601A1 (en) * 2003-08-14 2008-11-20 International Business Machines Corporation System and method for conditioned delivery of electronic mail
US8352556B2 (en) * 2003-08-14 2013-01-08 International Business Machines Corporation Conditioned delivery of electronic mail
US8539063B1 (en) 2003-08-29 2013-09-17 Mcafee, Inc. Method and system for containment of networked application client software by explicit human input
US20050050145A1 (en) * 2003-09-03 2005-03-03 Lowe John C. Second person review of email
US7890585B2 (en) * 2003-09-03 2011-02-15 Lowe John C Second person review of email
US8131813B2 (en) * 2003-09-03 2012-03-06 Lowe John C Second person review of E-mail
US20110106903A1 (en) * 2003-09-03 2011-05-05 Lowe John C Second Person Review of E-Mail
US8453196B2 (en) 2003-10-14 2013-05-28 Salesforce.Com, Inc. Policy management in an interoperability network
US20050080914A1 (en) * 2003-10-14 2005-04-14 Grand Central Communications, Inc., A Delaware Corporation Policy management in an interoperability network
US9473536B2 (en) 2003-10-14 2016-10-18 Salesforce.Com, Inc. Method, system, and computer program product for facilitating communication in an interoperability network
US20050086515A1 (en) * 2003-10-15 2005-04-21 Paris Clifford D. Motion detecting computer control device
US9338214B2 (en) 2003-10-16 2016-05-10 Salesforce.Com, Inc. Managing virtual business instances within a computer network
US7904882B2 (en) 2003-10-16 2011-03-08 Salesforce.Com, Inc. Managing virtual business instances within a computer network
US10489730B2 (en) 2003-10-16 2019-11-26 Salesforce.Com, Inc. Managing virtual business instances within a computer network
US20050086297A1 (en) * 2003-10-16 2005-04-21 Grand Central Communications, Inc. Managing virtual business instances within a computer network
US9916549B2 (en) 2003-10-16 2018-03-13 Salesforce.Com, Inc. Managing virtual business instances within a computer network
US9800548B2 (en) 2003-11-17 2017-10-24 Mcafee, Inc. Device, system and method for defending a computer network
US10785191B2 (en) 2003-11-17 2020-09-22 Mcafee, Llc Device, system and method for defending a computer network
US8839417B1 (en) 2003-11-17 2014-09-16 Mcafee, Inc. Device, system and method for defending a computer network
US11516181B2 (en) 2003-11-17 2022-11-29 Mcafee, Llc Device, system and method for defending a computer network
US9092471B2 (en) 2003-12-10 2015-07-28 Mcafee, Inc. Rule parser
US8656039B2 (en) 2003-12-10 2014-02-18 Mcafee, Inc. Rule parser
US9374225B2 (en) 2003-12-10 2016-06-21 Mcafee, Inc. Document de-registration
US8762386B2 (en) 2003-12-10 2014-06-24 Mcafee, Inc. Method and apparatus for data capture and analysis system
US8548170B2 (en) 2003-12-10 2013-10-01 Mcafee, Inc. Document de-registration
US8549546B2 (en) 2003-12-17 2013-10-01 Mcafee, Inc. Method and system for containment of usage of language interfaces
US8762928B2 (en) 2003-12-17 2014-06-24 Mcafee, Inc. Method and system for containment of usage of language interfaces
US8561082B2 (en) 2003-12-17 2013-10-15 Mcafee, Inc. Method and system for containment of usage of language interfaces
US10469471B2 (en) 2003-12-19 2019-11-05 Facebook, Inc. Custom messaging systems
US8281146B2 (en) 2003-12-19 2012-10-02 Facebook, Inc. Messaging systems and methods
US20050138430A1 (en) * 2003-12-19 2005-06-23 Landsman Richard A. Community messaging lists for authorization to deliver electronic messages
US7882360B2 (en) 2003-12-19 2011-02-01 Aol Inc. Community messaging lists for authorization to deliver electronic messages
US8949943B2 (en) 2003-12-19 2015-02-03 Facebook, Inc. Messaging systems and methods
US20070143824A1 (en) * 2003-12-23 2007-06-21 Majid Shahbazi System and method for enforcing a security policy on mobile devices using dynamically generated security profiles
US8635661B2 (en) 2003-12-23 2014-01-21 Mcafee, Inc. System and method for enforcing a security policy on mobile devices using dynamically generated security profiles
US20050154900A1 (en) * 2004-01-13 2005-07-14 Networks Associates Technology, Inc. Detecting malicious computer program activity using external program calls with dynamic rule sets
US8627458B2 (en) 2004-01-13 2014-01-07 Mcafee, Inc. Detecting malicious computer program activity using external program calls with dynamic rule sets
US20050193071A1 (en) * 2004-02-26 2005-09-01 Mike Hollatz Session to track actual e-mail handling time
US7373387B2 (en) 2004-02-26 2008-05-13 Rockwell Electronic Commerce Technologies Session to track actual e-mail handling time
US8478818B2 (en) 2004-03-23 2013-07-02 Salesforce.Com, Inc. Synchronous interface to asynchronous processes
US8260849B2 (en) 2004-03-23 2012-09-04 Salesforce.Com, Inc. Synchronous interface to asynchronous processes
US20050234928A1 (en) * 2004-03-23 2005-10-20 Grand Central Communications, Inc. Synchronous interface to asynchronous processes
US9674226B2 (en) 2004-03-23 2017-06-06 Salesforce.Com, Inc. Synchronous interface to asynchronous processes
US10516700B2 (en) 2004-03-23 2019-12-24 Salesforce.Com, Inc. Synchronous interface to asynchronous processes
US9032023B2 (en) 2004-03-23 2015-05-12 Salesforce.Com, Inc. Synchronous interface to asynchronous processes
US7739351B2 (en) 2004-03-23 2010-06-15 Salesforce.Com, Inc. Synchronous interface to asynchronous processes
US20100223301A1 (en) * 2004-03-23 2010-09-02 Salesforce.Com, Inc. Synchronous Interface to Asynchronous Processes
US20050223074A1 (en) * 2004-03-31 2005-10-06 Morris Robert P System and method for providing user selectable electronic message action choices and processing
WO2005098643A3 (en) * 2004-03-31 2007-07-12 Scenera Technologies Llc System and method for providing user selectable electronic message action choices and processing
US20050228863A1 (en) * 2004-04-07 2005-10-13 Grand Central Communications, Inc. Techniques for providing interoperability as a service
US7653587B2 (en) * 2004-04-07 2010-01-26 Ameriprise Financial, Inc. Automated account statement generation process
US20050228679A1 (en) * 2004-04-07 2005-10-13 Alana King Automated account statement generation process
US7590685B2 (en) 2004-04-07 2009-09-15 Salesforce.Com Inc. Techniques for providing interoperability as a service
US7756930B2 (en) 2004-05-28 2010-07-13 Ironport Systems, Inc. Techniques for determining the reputation of a message sender
US20060031314A1 (en) * 2004-05-28 2006-02-09 Robert Brahms Techniques for determining the reputation of a message sender
US20060010215A1 (en) * 2004-05-29 2006-01-12 Clegg Paul J Managing connections and messages at a server by associating different actions for both different senders and different recipients
US7870200B2 (en) 2004-05-29 2011-01-11 Ironport Systems, Inc. Monitoring the flow of messages received at a server
US7873695B2 (en) * 2004-05-29 2011-01-18 Ironport Systems, Inc. Managing connections and messages at a server by associating different actions for both different senders and different recipients
US20060031359A1 (en) * 2004-05-29 2006-02-09 Clegg Paul J Managing connections, messages, and directory harvest attacks at a server
US7849142B2 (en) 2004-05-29 2010-12-07 Ironport Systems, Inc. Managing connections, messages, and directory harvest attacks at a server
US20060059238A1 (en) * 2004-05-29 2006-03-16 Slater Charles S Monitoring the flow of messages received at a server
US20110208861A1 (en) * 2004-06-23 2011-08-25 Mcafee, Inc. Object classification in a capture system
US20100235445A1 (en) * 2004-08-06 2010-09-16 Salesforce.Com, Inc. Providing On-Demand Access to Services in a Wide Area Network
US7725605B2 (en) 2004-08-06 2010-05-25 Salesforce.Com, Inc. Providing on-demand access to services in a wide area network
US8838833B2 (en) 2004-08-06 2014-09-16 Salesforce.Com, Inc. Providing on-demand access to services in a wide area network
US20060031225A1 (en) * 2004-08-06 2006-02-09 Grand Central Communications, Inc. Providing on-demand access to services in a wide area network
US9690450B2 (en) 2004-08-16 2017-06-27 Microsoft Corporation User interface for displaying selectable software functionality controls that are relevant to a selected object
US9864489B2 (en) 2004-08-16 2018-01-09 Microsoft Corporation Command user interface for displaying multiple sections of software functionality controls
US8117542B2 (en) 2004-08-16 2012-02-14 Microsoft Corporation User interface for displaying selectable software functionality controls that are contextually relevant to a selected object
US9223477B2 (en) 2004-08-16 2015-12-29 Microsoft Technology Licensing, Llc Command user interface for displaying selectable software functionality controls
US8255828B2 (en) 2004-08-16 2012-08-28 Microsoft Corporation Command user interface for displaying selectable software functionality controls
US9690448B2 (en) 2004-08-16 2017-06-27 Microsoft Corporation User interface for displaying selectable software functionality controls that are relevant to a selected object
US10437431B2 (en) 2004-08-16 2019-10-08 Microsoft Technology Licensing, Llc Command user interface for displaying selectable software functionality controls
US9015621B2 (en) 2004-08-16 2015-04-21 Microsoft Technology Licensing, Llc Command user interface for displaying multiple sections of software functionality controls
US8146016B2 (en) 2004-08-16 2012-03-27 Microsoft Corporation User interface for displaying a gallery of formatting options applicable to a selected object
US9645698B2 (en) 2004-08-16 2017-05-09 Microsoft Technology Licensing, Llc User interface for displaying a gallery of formatting options applicable to a selected object
US9015624B2 (en) 2004-08-16 2015-04-21 Microsoft Corporation Floating command object
US10521081B2 (en) 2004-08-16 2019-12-31 Microsoft Technology Licensing, Llc User interface for displaying a gallery of formatting options
US20110138273A1 (en) * 2004-08-16 2011-06-09 Microsoft Corporation Floating Command Object
US10635266B2 (en) 2004-08-16 2020-04-28 Microsoft Technology Licensing, Llc User interface for displaying selectable software functionality controls that are relevant to a selected object
US8560534B2 (en) 2004-08-23 2013-10-15 Mcafee, Inc. Database for a capture system
US8707008B2 (en) 2004-08-24 2014-04-22 Mcafee, Inc. File system for a capture system
US20060075045A1 (en) * 2004-08-27 2006-04-06 Microsoft Corporation Securely extending data processing pipeline functionality
US8037123B2 (en) * 2004-08-27 2011-10-11 Microsoft Corporation Securely and efficiently extending data processing pipeline functionality
US7627636B2 (en) 2004-08-27 2009-12-01 Microsoft Corporation Securely extending data processing pipeline functionality
US20060069713A1 (en) * 2004-08-27 2006-03-30 Min Wei Securely and efficiently extending data processing pipeline functionality
US10664529B2 (en) 2004-09-03 2020-05-26 Open Text Sa Ulc Systems and methods for escalating a collaboration interface
US10817572B2 (en) 2004-09-03 2020-10-27 Open Text Sa Ulc Systems and methods for providing access to objects and searchable attributes of objects in a collaboration place
US10108613B2 (en) 2004-09-03 2018-10-23 Open Text Sa Ulc Systems and methods for providing access to data and searchable attributes in a collaboration place
US20110093842A1 (en) * 2004-09-07 2011-04-21 Mcafee, Inc., A Delaware Corporation Solidifying the executable software set of a computer
US8561051B2 (en) 2004-09-07 2013-10-15 Mcafee, Inc. Solidifying the executable software set of a computer
US20060075031A1 (en) * 2004-09-17 2006-04-06 Wagner Dirk P Bounce management
US7958093B2 (en) * 2004-09-17 2011-06-07 International Business Machines Corporation Optimizing a storage system to support short data lifetimes
US20060288047A1 (en) * 2004-09-17 2006-12-21 International Business Machines Corporation Method for bulk deletion through segmented files
US20120047188A9 (en) * 2004-09-17 2012-02-23 International Business Machines Corporation Method for bulk deletion through segmented files
US20060072400A1 (en) * 2004-09-17 2006-04-06 International Business Machines Corporation System and method for optimizing a storage system to support short data lifetimes
US8914330B2 (en) * 2004-09-17 2014-12-16 International Business Machines Corporation Bulk deletion through segmented files
US8839139B2 (en) 2004-09-30 2014-09-16 Microsoft Corporation User interface for providing task management and calendar information
US9645712B2 (en) 2004-10-01 2017-05-09 Grand Central Communications, Inc. Multiple stakeholders for a single business process
US8108919B2 (en) 2004-10-01 2012-01-31 Salesforce.Com, Inc. Application identity design
US11042271B2 (en) 2004-10-01 2021-06-22 Salesforce.Com, Inc. Multiple stakeholders for a single business process
US20100192204A1 (en) * 2004-10-01 2010-07-29 Salesforce.Com, Inc. Application Identity Design
US10333941B2 (en) 2004-10-01 2019-06-25 Salesforce.Com, Inc. Secure identity federation for non-federated systems
US7721328B2 (en) 2004-10-01 2010-05-18 Salesforce.Com Inc. Application identity design
US9450946B2 (en) 2004-10-01 2016-09-20 Salesforce.Com, Inc. Secure identity federation for non-federated systems
US9800586B2 (en) 2004-10-01 2017-10-24 Salesforce.Com, Inc. Secure identity federation for non-federated systems
US8499337B1 (en) 2004-10-06 2013-07-30 Mcafee, Inc. Systems and methods for delegation and notification of administration of internet access
US20090222894A1 (en) * 2004-10-06 2009-09-03 Shane Kenny Systems and Methods for Delegation and Notification of Administration of Internet Access
US8484703B2 (en) 2004-10-06 2013-07-09 Mcafee, Inc. Systems and methods for delegation and notification of administration of internet access
USRE45348E1 (en) 2004-10-20 2015-01-20 Seven Networks, Inc. Method and apparatus for intercepting events in a communication system
US8010082B2 (en) 2004-10-20 2011-08-30 Seven Networks, Inc. Flexible billing architecture
US8831561B2 (en) 2004-10-20 2014-09-09 Seven Networks, Inc System and method for tracking billing events in a mobile wireless network for a network operator
US8635690B2 (en) 2004-11-05 2014-01-21 Mcafee, Inc. Reputation based message processing
US20080184366A1 (en) * 2004-11-05 2008-07-31 Secure Computing Corporation Reputation based message processing
US8805334B2 (en) 2004-11-22 2014-08-12 Seven Networks, Inc. Maintaining mobile terminal information for secure communications
US8873411B2 (en) 2004-12-03 2014-10-28 Seven Networks, Inc. Provisioning of e-mail settings for a mobile terminal
US8116214B2 (en) 2004-12-03 2012-02-14 Seven Networks, Inc. Provisioning of e-mail settings for a mobile terminal
US8484295B2 (en) 2004-12-21 2013-07-09 Mcafee, Inc. Subscriber reputation filtering method for analyzing subscriber activity and detecting account misuse
US8738708B2 (en) 2004-12-21 2014-05-27 Mcafee, Inc. Bounce management in a trusted communication network
US10212188B2 (en) 2004-12-21 2019-02-19 Mcafee, Llc Trusted communication network
US20070244974A1 (en) * 2004-12-21 2007-10-18 Mxtn, Inc. Bounce Management in a Trusted Communication Network
US20070107059A1 (en) * 2004-12-21 2007-05-10 Mxtn, Inc. Trusted Communication Network
US9160755B2 (en) 2004-12-21 2015-10-13 Mcafee, Inc. Trusted communication network
US8555389B2 (en) 2005-01-10 2013-10-08 Mcafee, Inc. Integrated firewall, IPS, and virus scanner system and method
US8640237B2 (en) 2005-01-10 2014-01-28 Mcafee, Inc. Integrated firewall, IPS, and virus scanner system and method
US20110179491A1 (en) * 2005-01-14 2011-07-21 Mcafee, Inc., A Delaware Corporation System, method and computer program product for context-driven behavioral heuristics
US8392994B2 (en) 2005-01-14 2013-03-05 Mcafee, Inc. System, method and computer program product for context-driven behavioral heuristics
US11595424B2 (en) 2005-01-19 2023-02-28 Callahan Cellular L.L.C. Network appliance for vulnerability assessment auditing over multiple networks
US9306967B2 (en) 2005-01-19 2016-04-05 Callahan Cellular L.L.C. Network appliance for vulnerability assessment auditing over multiple networks
US20080060076A1 (en) * 2005-01-19 2008-03-06 Lockdown Networks, Inc. Network appliance for vulnerability assessment auditing over multiple networks
US8554903B2 (en) 2005-01-19 2013-10-08 Vadarro Services Limited Liability Company Network appliance for vulnerability assessment auditing over multiple networks
US10154057B2 (en) 2005-01-19 2018-12-11 Callahan Cellular L.L.C. Network appliance for vulnerability assessment auditing over multiple networks
US9374353B2 (en) 2005-01-26 2016-06-21 Mcafee, Inc. Enabling dynamic authentication with different protocols on the same port for a switch
US20100333176A1 (en) * 2005-01-26 2010-12-30 Mcafee, Inc., A Delaware Corporation Enabling Dynamic Authentication With Different Protocols on the Same Port for a Switch
US10110638B2 (en) 2005-01-26 2018-10-23 Mcafee, Llc Enabling dynamic authentication with different protocols on the same port for a switch
US8522318B2 (en) 2005-01-26 2013-08-27 Mcafee, Inc. Enabling dynamic authentication with different protocols on the same port for a switch
US8520512B2 (en) 2005-01-26 2013-08-27 Mcafee, Inc. Network appliance for customizable quarantining of a node on a network
US8011003B2 (en) 2005-02-14 2011-08-30 Symantec Corporation Method and apparatus for handling messages containing pre-selected data
US20060184549A1 (en) * 2005-02-14 2006-08-17 Rowney Kevin T Method and apparatus for modifying messages based on the presence of pre-selected data
US20060224589A1 (en) * 2005-02-14 2006-10-05 Rowney Kevin T Method and apparatus for handling messages containing pre-selected data
US8495700B2 (en) 2005-02-28 2013-07-23 Mcafee, Inc. Mobile data security system and methods
US9560064B2 (en) 2005-02-28 2017-01-31 Mcafee, Inc. Stopping and remediating outbound messaging abuse
US9210111B2 (en) 2005-02-28 2015-12-08 Mcafee, Inc. Stopping and remediating outbound messaging abuse
US9015472B1 (en) 2005-03-10 2015-04-21 Mcafee, Inc. Marking electronic messages to indicate human origination
US9369415B2 (en) 2005-03-10 2016-06-14 Mcafee, Inc. Marking electronic messages to indicate human origination
US8561086B2 (en) 2005-03-14 2013-10-15 Seven Networks, Inc. System and method for executing commands that are non-native to the native environment of a mobile device
US9047142B2 (en) 2005-03-14 2015-06-02 Seven Networks, Inc. Intelligent rendering of information in a limited display environment
US8209709B2 (en) 2005-03-14 2012-06-26 Seven Networks, Inc. Cross-platform event engine
US20100138658A1 (en) * 2005-03-15 2010-06-03 Aol Llc Electronic Message System with Federation of Trusted Senders
US8359360B2 (en) 2005-03-15 2013-01-22 Facebook, Inc. Electronic message system with federation of trusted senders
US7650383B2 (en) 2005-03-15 2010-01-19 Aol Llc Electronic message system with federation of trusted senders
US7647381B2 (en) * 2005-04-04 2010-01-12 Aol Llc Federated challenge credit system
US8713175B2 (en) 2005-04-04 2014-04-29 Facebook, Inc. Centralized behavioral information system
US8234371B2 (en) 2005-04-04 2012-07-31 Aol Inc. Federated challenge credit system
US20100138444A1 (en) * 2005-04-04 2010-06-03 Aol Llc Federated challenge credit system
US20060242244A1 (en) * 2005-04-04 2006-10-26 Logue Jay D Federated challenge credit system
US20060230117A1 (en) * 2005-04-08 2006-10-12 Cisco Technology, Inc. System and method for message prioritization
US8064583B1 (en) 2005-04-21 2011-11-22 Seven Networks, Inc. Multiple data store authentication
US8839412B1 (en) 2005-04-21 2014-09-16 Seven Networks, Inc. Flexible real-time inbox access
US8438633B1 (en) 2005-04-21 2013-05-07 Seven Networks, Inc. Flexible real-time inbox access
US20060253580A1 (en) * 2005-05-03 2006-11-09 Dixon Christopher J Website reputation product architecture
US8826154B2 (en) 2005-05-03 2014-09-02 Mcafee, Inc. System, method, and computer program product for presenting an indicia of risk associated with search results within a graphical user interface
US8516377B2 (en) 2005-05-03 2013-08-20 Mcafee, Inc. Indicating Website reputations during Website manipulation of user information
US20100042931A1 (en) * 2005-05-03 2010-02-18 Christopher John Dixon Indicating website reputations during website manipulation of user information
US20060253584A1 (en) * 2005-05-03 2006-11-09 Dixon Christopher J Reputation of an entity associated with a content item
US20060253583A1 (en) * 2005-05-03 2006-11-09 Dixon Christopher J Indicating website reputations based on website handling of personal information
US8566726B2 (en) 2005-05-03 2013-10-22 Mcafee, Inc. Indicating website reputations based on website handling of personal information
US9384345B2 (en) 2005-05-03 2016-07-05 Mcafee, Inc. Providing alternative web content based on website reputation assessment
US20080109473A1 (en) * 2005-05-03 2008-05-08 Dixon Christopher J System, method, and computer program product for presenting an indicia of risk reflecting an analysis associated with search results within a graphical user interface
US20060253578A1 (en) * 2005-05-03 2006-11-09 Dixon Christopher J Indicating website reputations during user interactions
US8321791B2 (en) 2005-05-03 2012-11-27 Mcafee, Inc. Indicating website reputations during website manipulation of user information
US8438499B2 (en) 2005-05-03 2013-05-07 Mcafee, Inc. Indicating website reputations during user interactions
US8429545B2 (en) 2005-05-03 2013-04-23 Mcafee, Inc. System, method, and computer program product for presenting an indicia of risk reflecting an analysis associated with search results within a graphical user interface
US8826155B2 (en) 2005-05-03 2014-09-02 Mcafee, Inc. System, method, and computer program product for presenting an indicia of risk reflecting an analysis associated with search results within a graphical user interface
AU2012258355B2 (en) * 2005-06-09 2015-01-22 Glasswall (Ip) Limited Resisting the Spread of Unwanted Code and Data
US8761756B2 (en) 2005-06-21 2014-06-24 Seven Networks International Oy Maintaining an IP connection in a mobile network
US8826378B2 (en) 2005-06-30 2014-09-02 Intel Corporation Techniques for authenticated posture reporting and associated enforcement of network access
US20100107224A1 (en) * 2005-06-30 2010-04-29 David Durham Techniques for authenticated posture reporting and associated enforcement of network access
US20100071032A1 (en) * 2005-06-30 2010-03-18 David Durham Techniques for Authenticated Posture Reporting and Associated Enforcement of Network Access
US8671439B2 (en) 2005-06-30 2014-03-11 Intel Corporation Techniques for authenticated posture reporting and associated enforcement of network access
US8763118B2 (en) 2005-07-14 2014-06-24 Mcafee, Inc. Classification of software on networked systems
US8468126B2 (en) 2005-08-01 2013-06-18 Seven Networks, Inc. Publishing data in an information community
US7853563B2 (en) 2005-08-01 2010-12-14 Seven Networks, Inc. Universal data aggregation
US8412675B2 (en) 2005-08-01 2013-04-02 Seven Networks, Inc. Context aware data presentation
US7917468B2 (en) 2005-08-01 2011-03-29 Seven Networks, Inc. Linking of personal information management data
US7917505B2 (en) 2005-08-01 2011-03-29 Seven Networks, Inc. Methods for publishing content
US8627099B2 (en) 2005-08-01 2014-01-07 Mcafee, Inc. System, method and computer program product for removing null values during scanning
US8069166B2 (en) 2005-08-01 2011-11-29 Seven Networks, Inc. Managing user-to-user contact with inferred presence information
US8730955B2 (en) 2005-08-12 2014-05-20 Mcafee, Inc. High speed packet capture
US20070043733A1 (en) * 2005-08-17 2007-02-22 Cannon David M Logical grouping and management of redundant objects in storage systems
US7610291B2 (en) * 2005-08-17 2009-10-27 International Business Machines Corporation Logical grouping and management of redundant objects in storage systems
US8239882B2 (en) 2005-08-30 2012-08-07 Microsoft Corporation Markup based extensibility for user interfaces
US8554774B2 (en) 2005-08-31 2013-10-08 Mcafee, Inc. System and method for word indexing in a capture system and querying thereof
WO2007027112A1 (en) * 2005-09-01 2007-03-08 Datasquirt Limited Quality assurance processing for electronic text messages
US8689137B2 (en) 2005-09-07 2014-04-01 Microsoft Corporation Command user interface for displaying selectable functionality controls in a database application
US9542667B2 (en) 2005-09-09 2017-01-10 Microsoft Technology Licensing, Llc Navigating messages within a thread
US10248687B2 (en) 2005-09-12 2019-04-02 Microsoft Technology Licensing, Llc Expanded search and find user interface
US9513781B2 (en) 2005-09-12 2016-12-06 Microsoft Technology Licensing, Llc Expanded search and find user interface
US8627222B2 (en) 2005-09-12 2014-01-07 Microsoft Corporation Expanded search and find user interface
US20070073686A1 (en) * 2005-09-28 2007-03-29 Brooks David A Method and system for full text indexing optimization through identification of idle and active content
US7756851B2 (en) * 2005-09-28 2010-07-13 International Business Machines Corporation Method and system for full text indexing optimization through identification of idle and active content
US8463800B2 (en) 2005-10-19 2013-06-11 Mcafee, Inc. Attributes of captured objects in a capture system
US8484725B1 (en) 2005-10-26 2013-07-09 Mcafee, Inc. System, method and computer program product for utilizing a threat scanner for performing non-threat-related processing
US20080250112A1 (en) * 2005-11-01 2008-10-09 International Business Machine Corporation Method and Apparatus for Determining Whether an Email Message is Ready for Transmission
US8661102B1 (en) 2005-11-28 2014-02-25 Mcafee, Inc. System, method and computer program product for detecting patterns among information from a distributed honey pot system
US7921165B2 (en) 2005-11-30 2011-04-05 Microsoft Corporation Retaining mail for availability after relay
US20070124484A1 (en) * 2005-11-30 2007-05-31 Microsoft Corporation Retaining mail for availability after relay
US8406523B1 (en) 2005-12-07 2013-03-26 Mcafee, Inc. System, method and computer program product for detecting unwanted data using a rendered format
US9166984B2 (en) 2005-12-21 2015-10-20 Mcafee, Inc. System, method and computer program product for controlling network communications based on policy compliance
US7810160B2 (en) 2005-12-28 2010-10-05 Microsoft Corporation Combining communication policies into common rules store
US20070150933A1 (en) * 2005-12-28 2007-06-28 Microsoft Corporation Combining communication policies into common rules store
US7734754B2 (en) * 2005-12-28 2010-06-08 Microsoft Corporation Reviewing effectiveness of communication rules system
US20070150253A1 (en) * 2005-12-28 2007-06-28 Microsoft Corporation Reviewing effectiveness of communication rules system
US8370928B1 (en) 2006-01-26 2013-02-05 Mcafee, Inc. System, method and computer program product for behavioral partitioning of a network to detect undesirable nodes
US9602515B2 (en) 2006-02-02 2017-03-21 Mcafee, Inc. Enforcing alignment of approved changes and deployed changes in the software change life-cycle
US9134998B2 (en) 2006-02-02 2015-09-15 Mcafee, Inc. Enforcing alignment of approved changes and deployed changes in the software change life-cycle
US8707446B2 (en) 2006-02-02 2014-04-22 Mcafee, Inc. Enforcing alignment of approved changes and deployed changes in the software change life-cycle
US8601160B1 (en) 2006-02-09 2013-12-03 Mcafee, Inc. System, method and computer program product for gathering information relating to electronic content utilizing a DNS server
US9246860B2 (en) 2006-02-09 2016-01-26 Mcafee, Inc. System, method and computer program product for gathering information relating to electronic content utilizing a DNS server
US20070192490A1 (en) * 2006-02-13 2007-08-16 Minhas Sandip S Content-based filtering of electronic messages
US9055102B2 (en) 2006-02-27 2015-06-09 Seven Networks, Inc. Location-based operations and messaging
US20070203992A1 (en) * 2006-02-28 2007-08-30 Research In Motion Limited Method, system and apparatus for partial electronic message forwarding
US7831258B2 (en) * 2006-02-28 2010-11-09 Research In Motion Limited Method, system and apparatus for partial electronic message forwarding
US8458789B1 (en) 2006-03-09 2013-06-04 Mcafee, Inc. System, method and computer program product for identifying unwanted code associated with network communications
US8504537B2 (en) 2006-03-24 2013-08-06 Mcafee, Inc. Signature distribution in a document registration system
US10360382B2 (en) 2006-03-27 2019-07-23 Mcafee, Llc Execution environment file inventory
US20110138461A1 (en) * 2006-03-27 2011-06-09 Mcafee, Inc., A Delaware Corporation Execution environment file inventory
US9576142B2 (en) 2006-03-27 2017-02-21 Mcafee, Inc. Execution environment file inventory
US8701196B2 (en) 2006-03-31 2014-04-15 Mcafee, Inc. System, method and computer program product for obtaining a reputation associated with a file
US8352930B1 (en) 2006-04-24 2013-01-08 Mcafee, Inc. Software modification by group to minimize breakage
US20070255850A1 (en) * 2006-05-01 2007-11-01 Gould Kim V W Methods and systems for data prioritization
US8862680B2 (en) 2006-05-01 2014-10-14 The Boeing Company Methods and systems for data prioritization
US8327439B2 (en) 2006-05-10 2012-12-04 Mcafee, Inc. System, method and computer program product for identifying functions in computer code that control a behavior thereof when executed
US9833709B2 (en) 2006-05-10 2017-12-05 Mcafee, Llc Game console system, method and computer program product with anti-malware/spyware and parental control capabilities
US8555404B1 (en) 2006-05-18 2013-10-08 Mcafee, Inc. Connectivity-based authorization
US8683035B2 (en) 2006-05-22 2014-03-25 Mcafee, Inc. Attributes of captured objects in a capture system
US9094338B2 (en) 2006-05-22 2015-07-28 Mcafee, Inc. Attributes of captured objects in a capture system
US8638333B2 (en) 2006-06-01 2014-01-28 Microsoft Corporation Modifying and formatting a chart using pictorially provided chart elements
US8605090B2 (en) 2006-06-01 2013-12-10 Microsoft Corporation Modifying and formatting a chart using pictorially provided chart elements
US10482637B2 (en) 2006-06-01 2019-11-19 Microsoft Technology Licensing, Llc Modifying and formatting a chart using pictorially provided chart elements
US9727989B2 (en) 2006-06-01 2017-08-08 Microsoft Technology Licensing, Llc Modifying and formatting a chart using pictorially provided chart elements
US8863159B2 (en) 2006-07-11 2014-10-14 Mcafee, Inc. System, method and computer program product for inserting an emulation layer in association with a COM server DLL
US8166113B2 (en) 2006-08-02 2012-04-24 Microsoft Corporation Access limited EMM distribution lists
US20080034042A1 (en) * 2006-08-02 2008-02-07 Microsoft Corporation Access limited emm distribution lists
US20080059477A1 (en) * 2006-08-30 2008-03-06 Embarq Holdings Company Llc Method and system for tracking service orders
US20080071770A1 (en) * 2006-09-18 2008-03-20 Nokia Corporation Method, Apparatus and Computer Program Product for Viewing a Virtual Database Using Portable Devices
US8750108B2 (en) 2006-10-23 2014-06-10 Mcafee, Inc. System and method for controlling mobile device access to a network
US11096054B2 (en) 2006-10-23 2021-08-17 Mcafee, Llc System and method for controlling mobile device access to a network
US8578501B1 (en) * 2006-11-14 2013-11-05 John W. Ogilvie Anonymous social networking with community-based privacy reviews obtained by members
US9419927B2 (en) 2006-11-14 2016-08-16 Mcafee, Inc. Method and system for handling unwanted email messages
US20080126481A1 (en) * 2006-11-26 2008-05-29 Al Chakra Method and system for providing communication context specific formality control
US8495434B2 (en) * 2006-11-27 2013-07-23 Fujitsu Limited Failure source server and mail server administrator alert management programs, systems, and methods
US20090204858A1 (en) * 2006-11-27 2009-08-13 Fujitsu Limited Server management program, system, and method, and mail server management program
US8560614B2 (en) 2006-11-29 2013-10-15 Mcafee, Inc. Scanner-driven email message decomposition
US8793326B2 (en) 2006-11-29 2014-07-29 Mcafee, Inc. System, method and computer program product for reconstructing data received by a computer in a manner that is independent of the computer
US8756290B2 (en) 2006-11-29 2014-06-17 Mcafee, Inc. System, method and computer program product for reconstructing data received by a computer in a manner that is independent of the computer
US20080126493A1 (en) * 2006-11-29 2008-05-29 Mcafee, Inc Scanner-driven email message decomposition
US8590002B1 (en) 2006-11-29 2013-11-19 Mcafee Inc. System, method and computer program product for maintaining a confidentiality of data on a network
US9686119B2 (en) 2006-12-19 2017-06-20 Mcafee, Inc. System, method and computer program product for scanning portions of data
US9106478B2 (en) 2006-12-19 2015-08-11 Mcafee, Inc. System, method and computer program product for scanning portions of data
US8528089B2 (en) 2006-12-19 2013-09-03 Mcafee, Inc. Known files database for malware elimination
US20080147612A1 (en) * 2006-12-19 2008-06-19 Mcafee, Inc. Known files database for malware elimination
US8707422B2 (en) 2007-01-10 2014-04-22 Mcafee, Inc. Method and apparatus for process enforced configuration management
US8332929B1 (en) 2007-01-10 2012-12-11 Mcafee, Inc. Method and apparatus for process enforced configuration management
US9864868B2 (en) 2007-01-10 2018-01-09 Mcafee, Llc Method and apparatus for process enforced configuration management
US8701182B2 (en) 2007-01-10 2014-04-15 Mcafee, Inc. Method and apparatus for process enforced configuration management
US9424154B2 (en) 2007-01-10 2016-08-23 Mcafee, Inc. Method of and system for computer system state checks
US8763114B2 (en) 2007-01-24 2014-06-24 Mcafee, Inc. Detecting image spam
US9027132B2 (en) 2007-01-24 2015-05-05 Mcafee, Inc. System, method and computer program product for monitoring and/or analyzing at least one aspect of an invocation of an interface
US9009321B2 (en) 2007-01-24 2015-04-14 Mcafee, Inc. Multi-dimensional reputation scoring
US8762537B2 (en) 2007-01-24 2014-06-24 Mcafee, Inc. Multi-dimensional reputation scoring
US10050917B2 (en) 2007-01-24 2018-08-14 Mcafee, Llc Multi-dimensional reputation scoring
US8578051B2 (en) 2007-01-24 2013-11-05 Mcafee, Inc. Reputation based load balancing
US9544272B2 (en) 2007-01-24 2017-01-10 Intel Corporation Detecting image spam
US9824215B2 (en) 2007-01-24 2017-11-21 Mcafee, Llc System, method, and computer program product for monitoring and/or analyzing at least one aspect of an invocation of an interface
US9807093B2 (en) 2007-01-29 2017-10-31 Litera Corporation Methods and systems for remotely removing metadata from electronic documents
US8977697B2 (en) 2007-01-29 2015-03-10 Litera Technology Llc Methods and systems for removing metadata from an electronic document attached to a message sent from a mobile electronic device
US7711716B2 (en) 2007-03-06 2010-05-04 Microsoft Corporation Optimizations for a background database consistency check
US8650200B2 (en) 2007-03-19 2014-02-11 Mcafee, Inc. System, method, and computer program product for identifying objects as at least potentially unwanted based on strings of symbols
US8862752B2 (en) 2007-04-11 2014-10-14 Mcafee, Inc. System, method, and computer program product for conditionally preventing the transfer of data based on a location thereof
US8621008B2 (en) 2007-04-26 2013-12-31 Mcafee, Inc. System, method and computer program product for performing an action based on an aspect of an electronic mail message thread
US8943158B2 (en) 2007-04-26 2015-01-27 Mcafee, Inc. System, method and computer program product for performing an action based on an aspect of an electronic mail message thread
US9628513B2 (en) 2007-04-30 2017-04-18 Mcafee, Inc. Electronic message manager system, method, and computer program product for scanning an electronic message for unwanted content and associated unwanted sites
US9037668B2 (en) 2007-04-30 2015-05-19 Mcafee, Inc. Electronic message manager system, method, and computer program product for scanning an electronic message for unwanted content and associated unwanted sites
US8601067B2 (en) 2007-04-30 2013-12-03 Mcafee, Inc. Electronic message manager system, method, and computer scanning an electronic message for unwanted content and associated unwanted sites
US8856931B2 (en) 2007-04-30 2014-10-07 Mcafee, Inc. Network browser system, method, and computer program product for scanning data for unwanted content and associated unwanted sites
US20100294827A1 (en) * 2007-05-16 2010-11-25 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Maneuverable surgical stapler
US8793802B2 (en) 2007-05-22 2014-07-29 Mcafee, Inc. System, method, and computer program product for preventing data leakage utilizing a map of data
US7937497B2 (en) 2007-05-31 2011-05-03 Red Hat, Inc. Apparatus for selectively copying at least portions of messages in a distributed computing system
US20080301286A1 (en) * 2007-05-31 2008-12-04 Mark Cameron Little Persistent message store
US8752065B2 (en) * 2007-05-31 2014-06-10 Red Hat, Inc. Rules engine for a persistent message store
US20080301707A1 (en) * 2007-05-31 2008-12-04 Mark Cameron Little Rules engine for a persistent message store
US8774844B2 (en) 2007-06-01 2014-07-08 Seven Networks, Inc. Integrated messaging
US8805425B2 (en) 2007-06-01 2014-08-12 Seven Networks, Inc. Integrated messaging
US8693494B2 (en) 2007-06-01 2014-04-08 Seven Networks, Inc. Polling
US8918864B2 (en) 2007-06-05 2014-12-23 Mcafee, Inc. System, method, and computer program product for making a scan decision during communication of data over a network
US8776252B2 (en) 2007-06-13 2014-07-08 Mcafee, Inc. System, method, and computer program product for securing data on a server based on a heuristic analysis
US8521891B1 (en) 2007-06-21 2013-08-27 Mcafee, Inc. Network browser system, method, and computer program product for conditionally loading a portion of data from a network based on a data transfer rate
US8037046B2 (en) 2007-06-29 2011-10-11 Microsoft Corporation Collecting and presenting temporal-based action information
US20110225635A1 (en) * 2007-06-29 2011-09-15 Rishi Kumar Non-obtrusive security system for devices
US20090006475A1 (en) * 2007-06-29 2009-01-01 Microsoft Corporation Collecting and Presenting Temporal-Based Action Information
US9098473B2 (en) 2007-06-29 2015-08-04 Microsoft Technology Licensing, Llc Accessing an out-space user interface for a document editor program
US8484578B2 (en) 2007-06-29 2013-07-09 Microsoft Corporation Communication between a document editor in-space user interface and a document editor out-space user interface
US8539563B2 (en) 2007-06-29 2013-09-17 McAfee (Singapore) Pte, Ltd. Non-obtrusive security system for devices
US9619116B2 (en) 2007-06-29 2017-04-11 Microsoft Technology Licensing, Llc Communication between a document editor in-space user interface and a document editor out-space user interface
US10642927B2 (en) 2007-06-29 2020-05-05 Microsoft Technology Licensing, Llc Transitions between user interfaces in a content editing application
US10592073B2 (en) 2007-06-29 2020-03-17 Microsoft Technology Licensing, Llc Exposing non-authoring features through document status information in an out-space user interface
US10521073B2 (en) 2007-06-29 2019-12-31 Microsoft Technology Licensing, Llc Exposing non-authoring features through document status information in an out-space user interface
US8762880B2 (en) 2007-06-29 2014-06-24 Microsoft Corporation Exposing non-authoring features through document status information in an out-space user interface
US8201103B2 (en) 2007-06-29 2012-06-12 Microsoft Corporation Accessing an out-space user interface for a document editor program
US8613093B2 (en) 2007-08-15 2013-12-17 Mcafee, Inc. System, method, and computer program product for comparing an object with object enumeration results to identify an anomaly that at least potentially indicates unwanted activity
US9215197B2 (en) 2007-08-17 2015-12-15 Mcafee, Inc. System, method, and computer program product for preventing image-related data loss
US10489606B2 (en) 2007-08-17 2019-11-26 Mcafee, Llc System, method, and computer program product for preventing image-related data loss
US8613006B2 (en) 2007-08-17 2013-12-17 Mcafee, Inc. System, method, and computer program product for terminating a hidden kernel process
US8601451B2 (en) 2007-08-29 2013-12-03 Mcafee, Inc. System, method, and computer program product for determining whether code is unwanted based on the decompilation thereof
US10198587B2 (en) 2007-09-05 2019-02-05 Mcafee, Llc System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session
US11645404B2 (en) 2007-09-05 2023-05-09 Mcafee, Llc System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session
US8458794B1 (en) 2007-09-06 2013-06-04 Mcafee, Inc. System, method, and computer program product for determining whether a hook is associated with potentially unwanted activity
US8707425B2 (en) 2007-09-07 2014-04-22 Mcafee, Inc. System, method, and computer program product for preventing scanning of a copy of a message
US8601094B2 (en) 2007-09-17 2013-12-03 Mcafee, Inc. Method and computer program product utilizing multiple UDP data packets to transfer a quantity of data otherwise in excess of a single UDP packet
US8446607B2 (en) 2007-10-01 2013-05-21 Mcafee, Inc. Method and system for policy based monitoring and blocking of printing activities on local and network printers
US20090086252A1 (en) * 2007-10-01 2009-04-02 Mcafee, Inc Method and system for policy based monitoring and blocking of printing activities on local and network printers
US9092624B2 (en) 2007-10-16 2015-07-28 Mcafee, Inc. System, method, and computer program product for conditionally performing a scan on data based on an associated data structure
US20090100519A1 (en) * 2007-10-16 2009-04-16 Mcafee, Inc. Installer detection and warning system and method
US8528092B2 (en) 2007-10-17 2013-09-03 Mcafee, Inc. System, method, and computer program product for identifying unwanted activity utilizing a honeypot device accessible via VLAN trunking
US8504622B1 (en) 2007-11-05 2013-08-06 Mcafee, Inc. System, method, and computer program product for reacting based on a frequency in which a compromised source communicates unsolicited electronic messages
US8621559B2 (en) 2007-11-06 2013-12-31 Mcafee, Inc. Adjusting filter or classification control settings
US20090119743A1 (en) * 2007-11-07 2009-05-07 Mcafee, Inc. Method and system for generic real time management of devices on computers connected to a network
US8484327B2 (en) 2007-11-07 2013-07-09 Mcafee, Inc. Method and system for generic real time management of devices on computers connected to a network
US9183386B2 (en) 2007-11-27 2015-11-10 Mcafee, Inc. Windows registry modification verification
US8503717B2 (en) 2007-12-04 2013-08-06 Mcafee, Inc. Detection of spam images
US8667582B2 (en) 2007-12-10 2014-03-04 Mcafee, Inc. System, method, and computer program product for directing predetermined network traffic to a honeypot
US8364181B2 (en) 2007-12-10 2013-01-29 Seven Networks, Inc. Electronic-mail filtering for mobile devices
US8738050B2 (en) 2007-12-10 2014-05-27 Seven Networks, Inc. Electronic-mail filtering for mobile devices
US9002828B2 (en) 2007-12-13 2015-04-07 Seven Networks, Inc. Predictive content delivery
US8793305B2 (en) 2007-12-13 2014-07-29 Seven Networks, Inc. Content delivery to a mobile device from a content service
US8671087B2 (en) 2007-12-18 2014-03-11 Mcafee, Inc. System, method and computer program product for scanning and indexing data for different purposes
US8560521B2 (en) 2007-12-21 2013-10-15 Mcafee, Inc. System, method, and computer program product for processing a prefix tree file utilizing a selected agent
US8655959B2 (en) 2008-01-03 2014-02-18 Mcafee, Inc. System, method, and computer program product for providing a rating of an electronic message
US8966638B2 (en) 2008-01-07 2015-02-24 Mcafee, Inc. System, method, and computer program product for selecting a wireless network based on security information
US8107921B2 (en) 2008-01-11 2012-01-31 Seven Networks, Inc. Mobile virtual network operator
US8914002B2 (en) 2008-01-11 2014-12-16 Seven Networks, Inc. System and method for providing a network service in a distributed fashion to a mobile device
US8909192B2 (en) 2008-01-11 2014-12-09 Seven Networks, Inc. Mobile virtual network operator
US9712986B2 (en) 2008-01-11 2017-07-18 Seven Networks, Llc Mobile device configured for communicating with another mobile device associated with an associated user
US8739189B2 (en) 2008-01-24 2014-05-27 Mcafee, Inc. System, method, and computer program product for invoking an application program interface within an interception of another application program interface
US11683279B2 (en) 2008-01-24 2023-06-20 Ebay Inc. System and method of using conversational agent to collect information and trigger actions
US8862657B2 (en) 2008-01-25 2014-10-14 Seven Networks, Inc. Policy based content service
US8849902B2 (en) 2008-01-25 2014-09-30 Seven Networks, Inc. System for providing policy based content service in a mobile network
US8838744B2 (en) 2008-01-28 2014-09-16 Seven Networks, Inc. Web-based access to data objects
US8799410B2 (en) 2008-01-28 2014-08-05 Seven Networks, Inc. System and method of a relay server for managing communications and notification between a mobile device and a web access server
US8515075B1 (en) 2008-01-31 2013-08-20 Mcafee, Inc. Method of and system for malicious software detection using critical address space protection
US8701189B2 (en) 2008-01-31 2014-04-15 Mcafee, Inc. Method of and system for computer system denial-of-service protection
US10002251B2 (en) 2008-02-12 2018-06-19 Mcafee, Llc Bootstrap OS protection and recovery
US20090205045A1 (en) * 2008-02-12 2009-08-13 Mcafee, Inc. Bootstrap OS protection and recovery
US8793477B2 (en) 2008-02-12 2014-07-29 Mcafee, Inc. Bootstrap OS protection and recovery
US9288222B2 (en) 2008-02-12 2016-03-15 Mcafee, Inc. Bootstrap OS protection and recovery
US8850029B2 (en) 2008-02-14 2014-09-30 Mcafee, Inc. System, method, and computer program product for managing at least one aspect of a connection based on application behavior
US9002771B2 (en) 2008-02-19 2015-04-07 Mcafee, Inc. System, method, and computer program product for applying a rule to associated events
US9483645B2 (en) 2008-03-05 2016-11-01 Mcafee, Inc. System, method, and computer program product for identifying unwanted data based on an assembled execution profile of code
US9843564B2 (en) 2008-03-14 2017-12-12 Mcafee, Inc. Securing data using integrated host-based data loss agent with encryption detection
US20090232300A1 (en) * 2008-03-14 2009-09-17 Mcafee, Inc. Securing data using integrated host-based data loss agent with encryption detection
US8893285B2 (en) 2008-03-14 2014-11-18 Mcafee, Inc. Securing data using integrated host-based data loss agent with encryption detection
US20090234708A1 (en) * 2008-03-17 2009-09-17 Heiser Ii Russel Robert Method and system for targeted content placement
US7996373B1 (en) 2008-03-28 2011-08-09 Symantec Corporation Method and apparatus for detecting policy violations in a data repository having an arbitrary data schema
US8255370B1 (en) 2008-03-28 2012-08-28 Symantec Corporation Method and apparatus for detecting policy violations in a data repository having an arbitrary data schema
US9235629B1 (en) 2008-03-28 2016-01-12 Symantec Corporation Method and apparatus for automatically correlating related incidents of policy violations
US7996374B1 (en) 2008-03-28 2011-08-09 Symantec Corporation Method and apparatus for automatically correlating related incidents of policy violations
US8065739B1 (en) 2008-03-28 2011-11-22 Symantec Corporation Detecting policy violations in information content containing data in a character-based language
US8527978B1 (en) 2008-03-31 2013-09-03 Mcafee, Inc. System, method, and computer program product for populating a list of known wanted data
US10445114B2 (en) 2008-03-31 2019-10-15 Microsoft Technology Licensing, Llc Associating command surfaces with multiple active components
US8606910B2 (en) 2008-04-04 2013-12-10 Mcafee, Inc. Prioritizing network traffic
US8589503B2 (en) 2008-04-04 2013-11-19 Mcafee, Inc. Prioritizing network traffic
US8358844B2 (en) 2008-04-14 2013-01-22 Mcafee, Inc. System, method, and computer program product for determining whether text within an image includes unwanted data, utilizing a matrix
US8615502B2 (en) 2008-04-18 2013-12-24 Mcafee, Inc. Method of and system for reverse mapping vnode pointers
US8955121B2 (en) 2008-04-29 2015-02-10 Mcafee, Inc. System, method, and computer program product for dynamically adjusting a level of security applied to a system
US8370941B1 (en) 2008-05-06 2013-02-05 Mcafee, Inc. Rootkit scanning system, method, and computer program product
US8200751B2 (en) 2008-05-20 2012-06-12 Raytheon Company System and method for maintaining stateful information
US20090292785A1 (en) * 2008-05-20 2009-11-26 Raytheon Company System and method for dynamic contact lists
US8112487B2 (en) 2008-05-20 2012-02-07 Raytheon Company System and method for message filtering
US20090292765A1 (en) * 2008-05-20 2009-11-26 Raytheon Company Method and apparatus for providing a synchronous interface for an asynchronous service
US8655954B2 (en) 2008-05-20 2014-02-18 Raytheon Company System and method for collaborative messaging and data distribution
US7970814B2 (en) 2008-05-20 2011-06-28 Raytheon Company Method and apparatus for providing a synchronous interface for an asynchronous service
US20090292784A1 (en) * 2008-05-20 2009-11-26 Raytheon Company System and method for message filtering
US20090292773A1 (en) * 2008-05-20 2009-11-26 Raytheon Company System and method for collaborative messaging and data distribution
US8028030B2 (en) 2008-05-22 2011-09-27 International Business Machines Corporation Method and system for supervising electronic text communications of an enterprise
US20090292779A1 (en) * 2008-05-22 2009-11-26 International Business Machines Corporation Method and System for Supervising Electronic Text Communications of an Enterprise
US20090313348A1 (en) * 2008-06-17 2009-12-17 Trevor Plestid Method and apparatus for remote manipulation of attachments
US8452854B2 (en) * 2008-06-17 2013-05-28 Research In Motion Limited Method and apparatus for remote manipulation of attachments
US8787947B2 (en) 2008-06-18 2014-07-22 Seven Networks, Inc. Application discovery on mobile devices
US10997562B2 (en) 2008-06-20 2021-05-04 Microsoft Technology Licensing, Llc Synchronized conversation-centric message list and message reading pane
US9665850B2 (en) 2008-06-20 2017-05-30 Microsoft Technology Licensing, Llc Synchronized conversation-centric message list and message reading pane
US8402096B2 (en) 2008-06-24 2013-03-19 Microsoft Corporation Automatic conversation techniques
US9338114B2 (en) 2008-06-24 2016-05-10 Microsoft Technology Licensing, Llc Automatic conversation techniques
US8078158B2 (en) 2008-06-26 2011-12-13 Seven Networks, Inc. Provisioning applications for a mobile device
US8494510B2 (en) 2008-06-26 2013-07-23 Seven Networks, Inc. Provisioning applications for a mobile device
US8918872B2 (en) 2008-06-27 2014-12-23 Mcafee, Inc. System, method, and computer program product for reacting in response to a detection of an attempt to store a configuration file and an executable file on a removable device
US9531748B2 (en) 2008-06-27 2016-12-27 Mcafee, Inc. System, method, and computer program product for reacting in response to a detection of an attempt to store a configuration file and an executable file on a removable device
US20100011410A1 (en) * 2008-07-10 2010-01-14 Weimin Liu System and method for data mining and security policy management
US8601537B2 (en) 2008-07-10 2013-12-03 Mcafee, Inc. System and method for data mining and security policy management
US8635706B2 (en) 2008-07-10 2014-01-21 Mcafee, Inc. System and method for data mining and security policy management
US10880721B2 (en) 2008-07-28 2020-12-29 Voip-Pal.Com, Inc. Mobile gateway
US10887399B2 (en) 2008-07-30 2021-01-05 Mcafee, Llc System, method, and computer program product for managing a connection between a device and a network
US11263591B2 (en) 2008-08-04 2022-03-01 Mcafee, Llc Method and system for centralized contact management
US10354229B2 (en) 2008-08-04 2019-07-16 Mcafee, Llc Method and system for centralized contact management
US8713468B2 (en) 2008-08-06 2014-04-29 Mcafee, Inc. System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy
US9077684B1 (en) 2008-08-06 2015-07-07 Mcafee, Inc. System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy
US9531656B2 (en) 2008-08-06 2016-12-27 Mcafee, Inc. System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy
US9253154B2 (en) 2008-08-12 2016-02-02 Mcafee, Inc. Configuration management for a capture/registration system
US10367786B2 (en) 2008-08-12 2019-07-30 Mcafee, Llc Configuration management for a capture/registration system
US9118720B1 (en) 2008-09-18 2015-08-25 Symantec Corporation Selective removal of protected content from web requests sent to an interactive website
US8826443B1 (en) 2008-09-18 2014-09-02 Symantec Corporation Selective removal of protected content from web requests sent to an interactive website
US8909759B2 (en) 2008-10-10 2014-12-09 Seven Networks, Inc. Bandwidth measurement
US10419525B2 (en) 2008-10-14 2019-09-17 Mcafee, Llc Server-based system, method, and computer program product for scanning data on a client using only a subset of the data
US8799450B2 (en) 2008-10-14 2014-08-05 Mcafee, Inc. Server-based system, method, and computer program product for scanning data on a client using only a subset of the data
US9544360B2 (en) 2008-10-14 2017-01-10 Mcafee, Inc. Server-based system, method, and computer program product for scanning data on a client using only a subset of the data
US20100115582A1 (en) * 2008-11-06 2010-05-06 Trust Digital System, method, and device for mediating connections between policy source servers, corporate respositories, and mobile devices
US20100112983A1 (en) * 2008-11-06 2010-05-06 Trust Digital System, method and device for mediating connections between policy source servers, corporate repositories, and mobile devices
US20100115581A1 (en) * 2008-11-06 2010-05-06 Trust Digital System method and device for mediating connections between policy source servers, corporate respositories, and mobile devices
US8565726B2 (en) 2008-11-06 2013-10-22 Mcafee, Inc. System, method and device for mediating connections between policy source servers, corporate repositories, and mobile devices
US8572676B2 (en) 2008-11-06 2013-10-29 Mcafee, Inc. System, method, and device for mediating connections between policy source servers, corporate repositories, and mobile devices
US8544003B1 (en) 2008-12-11 2013-09-24 Mcafee, Inc. System and method for managing virtual machine configurations
US20100162347A1 (en) * 2008-12-22 2010-06-24 Ian Barile Adaptive data loss prevention policies
US8613040B2 (en) 2008-12-22 2013-12-17 Symantec Corporation Adaptive data loss prevention policies
US8850591B2 (en) 2009-01-13 2014-09-30 Mcafee, Inc. System and method for concept building
US8706709B2 (en) 2009-01-15 2014-04-22 Mcafee, Inc. System and method for intelligent term grouping
US9195937B2 (en) 2009-02-25 2015-11-24 Mcafee, Inc. System and method for intelligent state management
US9602548B2 (en) 2009-02-25 2017-03-21 Mcafee, Inc. System and method for intelligent state management
US8473442B1 (en) 2009-02-25 2013-06-25 Mcafee, Inc. System and method for intelligent state management
US8935752B1 (en) 2009-03-23 2015-01-13 Symantec Corporation System and method for identity consolidation
US8918359B2 (en) 2009-03-25 2014-12-23 Mcafee, Inc. System and method for data mining and security policy management
US8447722B1 (en) 2009-03-25 2013-05-21 Mcafee, Inc. System and method for data mining and security policy management
US8667121B2 (en) 2009-03-25 2014-03-04 Mcafee, Inc. System and method for managing data and policies
US9313232B2 (en) 2009-03-25 2016-04-12 Mcafee, Inc. System and method for data mining and security policy management
US8782084B2 (en) 2009-03-31 2014-07-15 Mcafee, Inc. System, method, and computer program product for conditionally allowing access to data on a device based on a location of the device
US8572732B2 (en) 2009-04-21 2013-10-29 Mcafee, Inc. System, method, and computer program product for enabling communication between security systems
US20100293470A1 (en) * 2009-05-12 2010-11-18 Microsoft Corporatioin Hierarchically-Organized Control Galleries
US9875009B2 (en) 2009-05-12 2018-01-23 Microsoft Technology Licensing, Llc Hierarchically-organized control galleries
US9046983B2 (en) 2009-05-12 2015-06-02 Microsoft Technology Licensing, Llc Hierarchically-organized control galleries
US20100299394A1 (en) * 2009-05-20 2010-11-25 International Business Machines Corporation User-configured alternate email rendering
US10558949B2 (en) * 2009-05-20 2020-02-11 International Business Machines Corporation User-configured alternate email rendering
US8224917B1 (en) 2009-07-24 2012-07-17 Google Inc. Electronic communication reminder technology
US8046418B1 (en) 2009-07-24 2011-10-25 Jason Adam Denise Electronic communication reminder technology
US9137181B2 (en) 2009-07-24 2015-09-15 Google Inc. Electronic communication reminder technology
US8352561B1 (en) 2009-07-24 2013-01-08 Google Inc. Electronic communication reminder technology
US8661087B2 (en) 2009-07-24 2014-02-25 Google Inc. Electronic communication reminder technology
US7921174B1 (en) 2009-07-24 2011-04-05 Jason Adam Denise Electronic communication reminder technology
US8381284B2 (en) 2009-08-21 2013-02-19 Mcafee, Inc. System and method for enforcing security policies in a virtual environment
US9652607B2 (en) 2009-08-21 2017-05-16 Mcafee, Inc. System and method for enforcing security policies in a virtual environment
US8869265B2 (en) 2009-08-21 2014-10-21 Mcafee, Inc. System and method for enforcing security policies in a virtual environment
CN102484619A (en) * 2009-08-31 2012-05-30 高通股份有限公司 A system and method for evaluating outbound messages
US8769022B2 (en) 2009-08-31 2014-07-01 Qualcomm Incorporated System and method for evaluating outbound messages
KR101402561B1 (en) 2009-08-31 2014-05-30 퀄컴 인코포레이티드 A System and Method For Evaluating Outbound Messages
US20110055334A1 (en) * 2009-08-31 2011-03-03 Tivyan Roman System and method for evaluating outbound messages
WO2011026090A1 (en) * 2009-08-31 2011-03-03 Qualcomm Incorporated A system and method for evaluating outbound messages
US20110055907A1 (en) * 2009-09-03 2011-03-03 Mcafee, Inc. Host state monitoring
US9391858B2 (en) 2009-09-03 2016-07-12 Mcafee, Inc. Host information collection
US20110055382A1 (en) * 2009-09-03 2011-03-03 Mcafee, Inc. Host entry synchronization
US8924721B2 (en) 2009-09-03 2014-12-30 Mcafee, Inc. Nonce generation
US8881234B2 (en) 2009-09-03 2014-11-04 Mcafee, Inc. Host state monitoring
US20110055381A1 (en) * 2009-09-03 2011-03-03 Mcafee, Inc. Host information collection
US20110055580A1 (en) * 2009-09-03 2011-03-03 Mcafee, Inc. Nonce generation
US9049118B2 (en) 2009-09-03 2015-06-02 Mcafee, Inc. Probe election in failover configuration
US8583792B2 (en) 2009-09-03 2013-11-12 Mcafee, Inc. Probe election in failover configuration
US8671181B2 (en) 2009-09-03 2014-03-11 Mcafee, Inc. Host entry synchronization
US10932317B2 (en) 2009-09-17 2021-02-23 VolP-Pal.com, Inc. Uninterrupted transmission of internet protocol transmissions during endpoint changes
US8566942B2 (en) 2009-09-23 2013-10-22 Mcafee, Inc. System, method, and computer program product for tracking the migration of objects to determine whether to perform a network based check
US8131848B1 (en) 2009-09-29 2012-03-06 Jason Adam Denise Image analysis and communication device control technology
US8934719B1 (en) 2009-09-29 2015-01-13 Jason Adam Denise Image analysis and communication device control technology
US8538158B1 (en) 2009-09-29 2013-09-17 Jason Adam Denise Image analysis and communication device control technology
US8286085B1 (en) 2009-10-04 2012-10-09 Jason Adam Denise Attachment suggestion technology
US8863282B2 (en) 2009-10-15 2014-10-14 Mcafee Inc. Detecting and responding to malware using link files
US20110093952A1 (en) * 2009-10-15 2011-04-21 Mcafee, Inc. Detecting and responding to malware using link files
US20110093694A1 (en) * 2009-10-16 2011-04-21 Mcafee, Inc. Pattern Recognition Using Transition Table Templates
US8572014B2 (en) 2009-10-16 2013-10-29 Mcafee, Inc. Pattern recognition using transition table templates
US20110093953A1 (en) * 2009-10-20 2011-04-21 Mcafee, Inc. Preventing and responding to disabling of malware protection software
US9015829B2 (en) 2009-10-20 2015-04-21 Mcafee, Inc. Preventing and responding to disabling of malware protection software
US11263679B2 (en) 2009-10-23 2022-03-01 Ebay Inc. Product identification using multiple services
US8411684B1 (en) 2009-10-26 2013-04-02 Mcafee, Inc. System, method, and computer program product for determining a hop count between network devices utilizing a binary search
US9607150B2 (en) 2009-11-03 2017-03-28 Mcafee, Inc. Rollback feature
US8539583B2 (en) 2009-11-03 2013-09-17 Mcafee, Inc. Rollback feature
US9703958B2 (en) 2009-11-03 2017-07-11 Mcafee, Inc. Rollback feature
US9032523B2 (en) 2009-11-03 2015-05-12 Mcafee, Inc. Rollback feature
US9852296B2 (en) 2009-11-03 2017-12-26 Mcafee, Llc Rollback feature
US20110107424A1 (en) * 2009-11-03 2011-05-05 Mcafee, Inc. Rollback Feature
US9552497B2 (en) 2009-11-10 2017-01-24 Mcafee, Inc. System and method for preventing data loss using virtual machine wrapped applications
US9021595B2 (en) 2009-11-30 2015-04-28 Mcafee, Inc. Asset risk analysis
US8392998B1 (en) 2009-11-30 2013-03-05 Mcafee, Inc. Uniquely identifying attacked assets
US8495745B1 (en) 2009-11-30 2013-07-23 Mcafee, Inc. Asset risk analysis
US8484753B2 (en) 2009-12-02 2013-07-09 Mcafee, Inc. Hooking nonexported functions by the offset of the function
US20110131657A1 (en) * 2009-12-02 2011-06-02 Mcafee, Inc. Hooking nonexported functions by the offset of the function
US8645478B2 (en) 2009-12-10 2014-02-04 Mcafee, Inc. System and method for monitoring social engineering in a computer network environment
US8499351B1 (en) 2009-12-17 2013-07-30 Mcafee, Inc. Isolated security monitoring system
US20110191849A1 (en) * 2010-02-02 2011-08-04 Shankar Jayaraman System and method for risk rating and detecting redirection activities
US8869271B2 (en) 2010-02-02 2014-10-21 Mcafee, Inc. System and method for risk rating and detecting redirection activities
US8522199B2 (en) 2010-02-26 2013-08-27 Mcafee, Inc. System, method, and computer program product for applying a regular expression to content based on required strings of the regular expression
AU2011223614B2 (en) * 2010-03-05 2014-07-03 Microsoft Technology Licensing, Llc Information protection using zones
US20110219424A1 (en) * 2010-03-05 2011-09-08 Microsoft Corporation Information protection using zones
US9838349B2 (en) 2010-03-08 2017-12-05 Microsoft Technology Licensing, Llc Zone classification of electronic mail messages
US20110219081A1 (en) * 2010-03-08 2011-09-08 Microsoft Corporation Zone classification of electronic mail messages
US20110225622A1 (en) * 2010-03-12 2011-09-15 Derek Patton Pearcy System, method, and computer program product for displaying network events in terms of objects managed by a security appliance and/or a routing device
US8448221B2 (en) 2010-03-12 2013-05-21 Mcafee, Inc. System, method, and computer program product for displaying network events in terms of objects managed by a security appliance and/or a routing device
US9043731B2 (en) 2010-03-30 2015-05-26 Seven Networks, Inc. 3D mobile user interface with configurable workspace management
US8495747B1 (en) 2010-03-31 2013-07-23 Mcafee, Inc. Prioritizing asset remediations
US10204224B2 (en) 2010-04-08 2019-02-12 Mcafee Ireland Holdings Limited Systems and methods of processing data associated with detection and/or handling of malware
US9135443B2 (en) 2010-05-06 2015-09-15 Mcafee, Inc. Identifying malicious threads
US8935384B2 (en) 2010-05-06 2015-01-13 Mcafee Inc. Distributed data revocation using data commands
US8561198B2 (en) 2010-05-07 2013-10-15 Mcafee, Inc. Detection of malicious system calls
US8627462B2 (en) 2010-05-10 2014-01-07 Mcafee, Inc. Token processing
US8621638B2 (en) 2010-05-14 2013-12-31 Mcafee, Inc. Systems and methods for classification of messaging entities
CN102906748A (en) * 2010-05-24 2013-01-30 微软公司 Search-based system management
US20110289072A1 (en) * 2010-05-24 2011-11-24 Microsoft Corporation Search-based system management
US8849734B2 (en) 2010-06-29 2014-09-30 Mcafee Inc. System, method, and computer program product for updating an algorithm
US9043433B2 (en) 2010-07-26 2015-05-26 Seven Networks, Inc. Mobile network traffic coordination across multiple applications
US9077630B2 (en) 2010-07-26 2015-07-07 Seven Networks, Inc. Distributed implementation of dynamic wireless traffic policy
US9407713B2 (en) 2010-07-26 2016-08-02 Seven Networks, Llc Mobile application traffic optimization
US9049179B2 (en) 2010-07-26 2015-06-02 Seven Networks, Inc. Mobile network traffic coordination across multiple applications
US8886176B2 (en) 2010-07-26 2014-11-11 Seven Networks, Inc. Mobile application traffic optimization
US8838783B2 (en) 2010-07-26 2014-09-16 Seven Networks, Inc. Distributed caching for resource and mobile network traffic management
US8925101B2 (en) 2010-07-28 2014-12-30 Mcafee, Inc. System and method for local protection against malicious software
US8938800B2 (en) 2010-07-28 2015-01-20 Mcafee, Inc. System and method for network level protection against malicious software
US9467470B2 (en) 2010-07-28 2016-10-11 Mcafee, Inc. System and method for local protection against malicious software
US9832227B2 (en) 2010-07-28 2017-11-28 Mcafee, Llc System and method for network level protection against malicious software
US8869272B2 (en) 2010-08-13 2014-10-21 Mcafee, Inc. System, method, and computer program product for preventing a modification to a domain name system setting
US9294505B2 (en) 2010-08-13 2016-03-22 Mcafee, Inc. System, method, and computer program product for preventing a modification to a domain name system setting
US8843496B2 (en) 2010-09-12 2014-09-23 Mcafee, Inc. System and method for clustering host inventories
US8549003B1 (en) 2010-09-12 2013-10-01 Mcafee, Inc. System and method for clustering host inventories
US8966066B2 (en) 2010-11-01 2015-02-24 Seven Networks, Inc. Application and network-based long poll request detection and cacheability assessment therefor
US8166164B1 (en) 2010-11-01 2012-04-24 Seven Networks, Inc. Application and network-based long poll request detection and cacheability assessment therefor
US9275163B2 (en) 2010-11-01 2016-03-01 Seven Networks, Llc Request and response characteristics based adaptation of distributed caching in a mobile network
US8190701B2 (en) 2010-11-01 2012-05-29 Seven Networks, Inc. Cache defeat detection and caching of content addressed by identifiers intended to defeat cache
US8204953B2 (en) 2010-11-01 2012-06-19 Seven Networks, Inc. Distributed system for cache defeat detection and caching of content addressed by identifiers intended to defeat cache
US9330196B2 (en) 2010-11-01 2016-05-03 Seven Networks, Llc Wireless traffic management system cache optimization using http headers
US9060032B2 (en) 2010-11-01 2015-06-16 Seven Networks, Inc. Selective data compression by a distributed traffic management system to reduce mobile data traffic and signaling traffic
US8291076B2 (en) 2010-11-01 2012-10-16 Seven Networks, Inc. Application and network-based long poll request detection and cacheability assessment therefor
US8326985B2 (en) 2010-11-01 2012-12-04 Seven Networks, Inc. Distributed management of keep-alive message signaling for mobile network resource conservation and optimization
US8700728B2 (en) 2010-11-01 2014-04-15 Seven Networks, Inc. Cache defeat detection and caching of content addressed by identifiers intended to defeat cache
US8843153B2 (en) 2010-11-01 2014-09-23 Seven Networks, Inc. Mobile traffic categorization and policy for network use optimization while preserving user experience
US8484314B2 (en) 2010-11-01 2013-07-09 Seven Networks, Inc. Distributed caching in a wireless network of content delivered for a mobile application over a long-held request
US8782222B2 (en) 2010-11-01 2014-07-15 Seven Networks Timing of keep-alive messages used in a system for mobile network resource conservation and optimization
US10313337B2 (en) 2010-11-04 2019-06-04 Mcafee, Llc System and method for protecting specified data combinations
US8806615B2 (en) 2010-11-04 2014-08-12 Mcafee, Inc. System and method for protecting specified data combinations
US11316848B2 (en) 2010-11-04 2022-04-26 Mcafee, Llc System and method for protecting specified data combinations
US10666646B2 (en) 2010-11-04 2020-05-26 Mcafee, Llc System and method for protecting specified data combinations
US9794254B2 (en) 2010-11-04 2017-10-17 Mcafee, Inc. System and method for protecting specified data combinations
US9100873B2 (en) 2010-11-22 2015-08-04 Seven Networks, Inc. Mobile network background traffic data management
US8417823B2 (en) 2010-11-22 2013-04-09 Seven Network, Inc. Aligning data transfer to optimize connections established for transmission over a wireless network
US8539040B2 (en) 2010-11-22 2013-09-17 Seven Networks, Inc. Mobile network background traffic data management with optimized polling intervals
US8903954B2 (en) 2010-11-22 2014-12-02 Seven Networks, Inc. Optimization of resource polling intervals to satisfy mobile device requests
US8479297B1 (en) 2010-11-23 2013-07-02 Mcafee, Inc. Prioritizing network assets
US9589254B2 (en) 2010-12-08 2017-03-07 Microsoft Technology Licensing, Llc Using e-mail message characteristics for prioritization
US10021055B2 (en) 2010-12-08 2018-07-10 Microsoft Technology Licensing, Llc Using e-mail message characteristics for prioritization
US9325662B2 (en) 2011-01-07 2016-04-26 Seven Networks, Llc System and method for reduction of mobile network traffic used for domain name system (DNS) queries
US9075993B2 (en) 2011-01-24 2015-07-07 Mcafee, Inc. System and method for selectively grouping and managing program files
US9112830B2 (en) 2011-02-23 2015-08-18 Mcafee, Inc. System and method for interlocking a host and a gateway
US9866528B2 (en) 2011-02-23 2018-01-09 Mcafee, Llc System and method for interlocking a host and a gateway
US9122877B2 (en) 2011-03-21 2015-09-01 Mcafee, Inc. System and method for malware and network reputation correlation
US9661017B2 (en) 2011-03-21 2017-05-23 Mcafee, Inc. System and method for malware and network reputation correlation
US8806645B2 (en) 2011-04-01 2014-08-12 Mcafee, Inc. Identifying relationships between security metrics
US8495386B2 (en) 2011-04-05 2013-07-23 Mcafee, Inc. Encryption of memory device with wear leveling
US9084105B2 (en) 2011-04-19 2015-07-14 Seven Networks, Inc. Device resources sharing for network resource conservation
US8356080B2 (en) 2011-04-19 2013-01-15 Seven Networks, Inc. System and method for a mobile device to use physical storage of another device for caching
US9300719B2 (en) 2011-04-19 2016-03-29 Seven Networks, Inc. System and method for a mobile device to use physical storage of another device for caching
US8316098B2 (en) 2011-04-19 2012-11-20 Seven Networks Inc. Social caching for device resource sharing and management
US8621075B2 (en) 2011-04-27 2013-12-31 Seven Metworks, Inc. Detecting and preserving state for satisfying application requests in a distributed proxy and cache system
US8832228B2 (en) 2011-04-27 2014-09-09 Seven Networks, Inc. System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief
US8635339B2 (en) 2011-04-27 2014-01-21 Seven Networks, Inc. Cache state management on a mobile device to preserve user experience
US8650287B2 (en) 2011-04-27 2014-02-11 Mcafee, Inc. Local reputation to adjust sensitivity of behavioral detection system
US9172715B2 (en) 2011-04-27 2015-10-27 Mcafee, Inc. Stealth network attack monitoring
US9213838B2 (en) 2011-05-13 2015-12-15 Mcafee Ireland Holdings Limited Systems and methods of processing data associated with detection and/or handling of malware
US9298910B2 (en) 2011-06-08 2016-03-29 Mcafee, Inc. System and method for virtual partition monitoring
US10032024B2 (en) 2011-06-08 2018-07-24 Mcafee, Llc System and method for virtual partition monitoring
US9106680B2 (en) 2011-06-27 2015-08-11 Mcafee, Inc. System and method for protocol fingerprinting and reputation correlation
US8695027B2 (en) 2011-06-30 2014-04-08 Mcafee, Inc. System and method for application security assessment
US20130013705A1 (en) * 2011-07-08 2013-01-10 Image Vision Labs, Inc. Image scene recognition
US8769692B1 (en) 2011-07-14 2014-07-01 Mcafee, Inc. System and method for detecting malware by transforming objects and analyzing different views of objects
US8997234B2 (en) 2011-07-27 2015-03-31 Mcafee, Inc. System and method for network-based asset operational dependence scoring
US8984581B2 (en) 2011-07-27 2015-03-17 Seven Networks, Inc. Monitoring mobile application activities for malicious traffic on a mobile device
US9239800B2 (en) 2011-07-27 2016-01-19 Seven Networks, Llc Automatic generation and distribution of policy information regarding malicious mobile traffic in a wireless network
US9311126B2 (en) 2011-07-27 2016-04-12 Mcafee, Inc. System and method for virtual partition monitoring
US8707434B2 (en) 2011-08-17 2014-04-22 Mcafee, Inc. System and method for indirect interface monitoring and plumb-lining
US9237171B2 (en) 2011-08-17 2016-01-12 Mcafee, Inc. System and method for indirect interface monitoring and plumb-lining
US10701036B2 (en) 2011-08-24 2020-06-30 Mcafee, Llc System, method, and computer program for preventing infections from spreading in a network environment using dynamic application of a firewall policy
US9380072B2 (en) 2011-08-24 2016-06-28 Mcafee, Inc. System, method, and computer program for preventing infections from spreading in a network environment using dynamic application of a firewall policy
US10031646B2 (en) 2011-09-07 2018-07-24 Mcafee, Llc Computer system security dashboard
US9594881B2 (en) 2011-09-09 2017-03-14 Mcafee, Inc. System and method for passive threat detection using virtual memory inspection
US9262624B2 (en) 2011-09-16 2016-02-16 Mcafee, Inc. Device-tailored whitelists
US9811667B2 (en) 2011-09-21 2017-11-07 Mcafee, Inc. System and method for grouping computer vulnerabilities
US9251351B2 (en) 2011-09-21 2016-02-02 Mcafee, Inc. System and method for grouping computer vulnerabilities
US9560020B2 (en) 2011-09-28 2017-01-31 Mcafee, Inc. Securing email conversations
US8930689B2 (en) 2011-09-28 2015-01-06 Mcafee, Inc. Securing email conversations
US8683220B2 (en) 2011-09-29 2014-03-25 Mcafee, Inc. System and method for securing database activity
US20130086486A1 (en) * 2011-09-30 2013-04-04 Michael James Ahiakpor Mutable Message Attributes
US8694738B2 (en) 2011-10-11 2014-04-08 Mcafee, Inc. System and method for critical address space protection in a hypervisor environment
US9043918B2 (en) 2011-10-13 2015-05-26 Mcafee, Inc. System and method for profile based filtering of outgoing information in a mobile environment
US9465700B2 (en) 2011-10-13 2016-10-11 Mcafee, Inc. System and method for kernel rootkit protection in a hypervisor environment
US9946562B2 (en) 2011-10-13 2018-04-17 Mcafee, Llc System and method for kernel rootkit protection in a hypervisor environment
US8973144B2 (en) 2011-10-13 2015-03-03 Mcafee, Inc. System and method for kernel rootkit protection in a hypervisor environment
US9069586B2 (en) 2011-10-13 2015-06-30 Mcafee, Inc. System and method for kernel rootkit protection in a hypervisor environment
US8850512B2 (en) 2011-10-13 2014-09-30 Mcafee, Inc. Security assessment of virtual machine environments
US9112896B2 (en) 2011-10-17 2015-08-18 Mcafee, Inc. Mobile risk assessment
US9882876B2 (en) 2011-10-17 2018-01-30 Mcafee, Llc System and method for redirected firewall discovery in a network environment
US8677497B2 (en) 2011-10-17 2014-03-18 Mcafee, Inc. Mobile risk assessment
US9356909B2 (en) 2011-10-17 2016-05-31 Mcafee, Inc. System and method for redirected firewall discovery in a network environment
US8949993B2 (en) 2011-10-17 2015-02-03 Mcafee Inc. Mobile risk assessment
US10652210B2 (en) 2011-10-17 2020-05-12 Mcafee, Llc System and method for redirected firewall discovery in a network environment
US10701098B2 (en) 2011-10-17 2020-06-30 Mcafee, Llc Mobile risk assessment
US11159558B2 (en) 2011-10-17 2021-10-26 Mcafee, Llc Mobile risk assessment
US8800024B2 (en) 2011-10-17 2014-08-05 Mcafee, Inc. System and method for host-initiated firewall discovery in a network environment
US8713668B2 (en) 2011-10-17 2014-04-29 Mcafee, Inc. System and method for redirected firewall discovery in a network environment
US8650638B2 (en) 2011-10-18 2014-02-11 Mcafee, Inc. System and method for detecting a file embedded in an arbitrary location and determining the reputation of the file
US9548994B2 (en) 2011-10-18 2017-01-17 Mcafee, Inc. Integrating security policy and event management
US8839349B2 (en) 2011-10-18 2014-09-16 Mcafee, Inc. Integrating security policy and event management
US8677487B2 (en) 2011-10-18 2014-03-18 Mcafee, Inc. System and method for detecting a malicious command and control channel
US8881289B2 (en) 2011-10-18 2014-11-04 Mcafee, Inc. User behavioral risk assessment
US9058486B2 (en) 2011-10-18 2015-06-16 Mcafee, Inc. User behavioral risk assessment
US8646089B2 (en) 2011-10-18 2014-02-04 Mcafee, Inc. System and method for transitioning to a whitelist mode during a malware attack in a network environment
US9648035B2 (en) 2011-10-18 2017-05-09 Mcafee, Inc. User behavioral risk assessment
US9250928B2 (en) 2011-10-18 2016-02-02 Mcafee, Inc. Cooperative mobile analytics
US10505965B2 (en) 2011-10-18 2019-12-10 Mcafee, Llc User behavioral risk assessment
US9635047B2 (en) 2011-10-18 2017-04-25 Mcafee, Inc. User behavioral risk assessment
USD692451S1 (en) 2011-10-26 2013-10-29 Mcafee, Inc. Computer having graphical user interface
USD692911S1 (en) 2011-10-26 2013-11-05 Mcafee, Inc. Computer having graphical user interface
USD692912S1 (en) 2011-10-26 2013-11-05 Mcafee, Inc. Computer having graphical user interface
USD692453S1 (en) 2011-10-26 2013-10-29 Mcafee, Inc. Computer having graphical user interface
USD692452S1 (en) 2011-10-26 2013-10-29 Mcafee, Inc. Computer having graphical user interface
USD691168S1 (en) 2011-10-26 2013-10-08 Mcafee, Inc. Computer having graphical user interface
USD692454S1 (en) 2011-10-26 2013-10-29 Mcafee, Inc. Computer having graphical user interface
USD693845S1 (en) 2011-10-26 2013-11-19 Mcafee, Inc. Computer having graphical user interface
USD691167S1 (en) 2011-10-26 2013-10-08 Mcafee, Inc. Computer having graphical user interface
USD722613S1 (en) 2011-10-27 2015-02-17 Mcafee Inc. Computer display screen with graphical user interface
US8918503B2 (en) 2011-12-06 2014-12-23 Seven Networks, Inc. Optimization of mobile traffic directed to private networks and operator configurability thereof
US8977755B2 (en) 2011-12-06 2015-03-10 Seven Networks, Inc. Mobile device and method to utilize the failover mechanism for fault tolerance provided for mobile traffic management and network/device resource conservation
US8868753B2 (en) 2011-12-06 2014-10-21 Seven Networks, Inc. System of redundantly clustered machines to provide failover mechanisms for mobile traffic management and network resource conservation
US9208123B2 (en) 2011-12-07 2015-12-08 Seven Networks, Llc Mobile device having content caching mechanisms integrated with a network operator for traffic alleviation in a wireless network and methods therefor
US9277443B2 (en) 2011-12-07 2016-03-01 Seven Networks, Llc Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol
US9173128B2 (en) 2011-12-07 2015-10-27 Seven Networks, Llc Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol
US9009250B2 (en) 2011-12-07 2015-04-14 Seven Networks, Inc. Flexible and dynamic integration schemas of a traffic management system with various network operators for network traffic alleviation
US8861354B2 (en) 2011-12-14 2014-10-14 Seven Networks, Inc. Hierarchies and categories for management and deployment of policies for distributed wireless traffic optimization
US9832095B2 (en) 2011-12-14 2017-11-28 Seven Networks, Llc Operation modes for mobile traffic optimization and concurrent management of optimized and non-optimized traffic
US9021021B2 (en) 2011-12-14 2015-04-28 Seven Networks, Inc. Mobile network reporting and usage analytics system and method aggregated using a distributed traffic optimization system
US9367397B1 (en) * 2011-12-20 2016-06-14 Emc Corporation Recovering data lost in data de-duplication system
US10360182B2 (en) * 2011-12-20 2019-07-23 EMC IP Holding Company LLC Recovering data lost in data de-duplication system
US8789190B2 (en) 2011-12-23 2014-07-22 Mcafee, Inc. System and method for scanning for computer vulnerabilities in a network environment
US9430564B2 (en) 2011-12-27 2016-08-30 Mcafee, Inc. System and method for providing data protection workflows in a network environment
US8700561B2 (en) 2011-12-27 2014-04-15 Mcafee, Inc. System and method for providing data protection workflows in a network environment
US8595822B2 (en) 2011-12-29 2013-11-26 Mcafee, Inc. System and method for cloud based scanning for computer vulnerabilities in a network environment
US9223874B2 (en) 2011-12-29 2015-12-29 Mcafee, Inc. Collaborative searching
US8886630B2 (en) 2011-12-29 2014-11-11 Mcafee, Inc. Collaborative searching
US10038708B2 (en) 2011-12-29 2018-07-31 Mcafee, Llc Geo-mapping system security events
US8973147B2 (en) 2011-12-29 2015-03-03 Mcafee, Inc. Geo-mapping system security events
US9356970B2 (en) 2011-12-29 2016-05-31 Mcafee, Inc. Geo-mapping system security events
US9703878B2 (en) 2011-12-29 2017-07-11 Mcafee, Inc. Collaborative searching
US9131370B2 (en) 2011-12-29 2015-09-08 Mcafee, Inc. Simplified mobile communication device
US9544772B2 (en) 2011-12-29 2017-01-10 Mcafee, Inc. Simplified mobile communication device
US8909202B2 (en) 2012-01-05 2014-12-09 Seven Networks, Inc. Detection and management of user interactions with foreground applications on a mobile device in distributed caching
US9131397B2 (en) 2012-01-05 2015-09-08 Seven Networks, Inc. Managing cache to prevent overloading of a wireless network due to user activity
US20130191919A1 (en) * 2012-01-19 2013-07-25 Mcafee, Inc. Calculating quantitative asset risk
US8595845B2 (en) * 2012-01-19 2013-11-26 Mcafee, Inc. Calculating quantitative asset risk
US9319362B1 (en) * 2012-01-25 2016-04-19 Solace Systems, Inc. Messaging system with distributed filtering modules which register interests, remove any messages that do not match the registered interest, and forward any matched messages for delivery
US9680869B2 (en) 2012-01-26 2017-06-13 Mcafee, Inc. System and method for innovative management of transport layer security session tickets in a network environment
US9026784B2 (en) 2012-01-26 2015-05-05 Mcafee, Inc. System and method for innovative management of transport layer security session tickets in a network environment
US9203864B2 (en) 2012-02-02 2015-12-01 Seven Networks, Llc Dynamic categorization of applications for network access in a mobile network
US9326189B2 (en) 2012-02-03 2016-04-26 Seven Networks, Llc User as an end point for profiling and optimizing the delivery of content and data in a wireless network
US8874766B2 (en) 2012-03-09 2014-10-28 Mcafee, Inc. System and method for flexible network access control policies in a network environment
US9210193B2 (en) 2012-03-09 2015-12-08 Mcafee, Inc. System and method for flexible network access control policies in a network environment
US9413785B2 (en) 2012-04-02 2016-08-09 Mcafee, Inc. System and method for interlocking a host and a gateway
US8739272B1 (en) 2012-04-02 2014-05-27 Mcafee, Inc. System and method for interlocking a host and a gateway
US10070313B2 (en) 2012-04-09 2018-09-04 Mcafee, Llc Wireless token device
US9547761B2 (en) 2012-04-09 2017-01-17 Mcafee, Inc. Wireless token device
US8819445B2 (en) 2012-04-09 2014-08-26 Mcafee, Inc. Wireless token authentication
US8812695B2 (en) 2012-04-09 2014-08-19 Seven Networks, Inc. Method and system for management of a virtual network connection without heartbeat messages
US9262592B2 (en) 2012-04-09 2016-02-16 Mcafee, Inc. Wireless storage device
US9407653B2 (en) 2012-04-10 2016-08-02 Mcafee, Inc. Unified scan management
US8931043B2 (en) 2012-04-10 2015-01-06 Mcafee Inc. System and method for determining and using local reputations of users and hosts to protect information in a network environment
US8800046B2 (en) 2012-04-10 2014-08-05 Mcafee, Inc. Unified scan engine
US10263899B2 (en) 2012-04-10 2019-04-16 Seven Networks, Llc Enhanced customer service for mobile carriers using real-time and historical mobile application and traffic or optimization data associated with mobile devices in a mobile network
US9516062B2 (en) 2012-04-10 2016-12-06 Mcafee, Inc. System and method for determining and using local reputations of users and hosts to protect information in a network environment
US9516451B2 (en) 2012-04-10 2016-12-06 Mcafee, Inc. Opportunistic system scanning
US9847965B2 (en) 2012-04-11 2017-12-19 Mcafee, Llc Asset detection system
US9049207B2 (en) 2012-04-11 2015-06-02 Mcafee, Inc. Asset detection system
US8955036B2 (en) 2012-04-11 2015-02-10 Mcafee, Inc. System asset repository management
US8954573B2 (en) 2012-04-11 2015-02-10 Mcafee Inc. Network address repository management
US9152784B2 (en) 2012-04-18 2015-10-06 Mcafee, Inc. Detection and prevention of installation of malicious mobile applications
US9596257B2 (en) 2012-04-18 2017-03-14 Mcafee, Inc. Detection and prevention of installation of malicious mobile applications
US8775631B2 (en) 2012-07-13 2014-07-08 Seven Networks, Inc. Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications
US10171475B2 (en) 2012-07-16 2019-01-01 Mcafee, Llc Cloud email message scanning with local policy application in a network environment
US9705889B2 (en) 2012-07-16 2017-07-11 Mcafee, Inc. Cloud email message scanning with local policy application in a network environment
US9049235B2 (en) 2012-07-16 2015-06-02 Mcafee, Inc. Cloud email message scanning with local policy application in a network environment
US9262623B2 (en) 2012-08-22 2016-02-16 Mcafee, Inc. Anonymous shipment brokering
US9268933B2 (en) 2012-08-22 2016-02-23 Mcafee, Inc. Privacy broker
US9185093B2 (en) 2012-10-16 2015-11-10 Mcafee, Inc. System and method for correlating network information with subscriber information in a mobile network environment
US9338657B2 (en) 2012-10-16 2016-05-10 Mcafee, Inc. System and method for correlating security events with subscriber information in a mobile network environment
US10360398B2 (en) 2012-10-19 2019-07-23 Mcafee, Llc Secure disk access control
US10097561B2 (en) 2012-10-19 2018-10-09 Mcafee, Llc Data loss prevention for mobile computing devices
US9326134B2 (en) 2012-10-19 2016-04-26 Mcafee Inc. Data loss prevention for mobile computing devices
US10114950B2 (en) 2012-10-19 2018-10-30 McAFEE, LLC. Mobile application management
US11157616B2 (en) 2012-10-19 2021-10-26 Mcafee, Llc Mobile application management
US9672374B2 (en) 2012-10-19 2017-06-06 Mcafee, Inc. Secure disk access control
US11270015B2 (en) 2012-10-19 2022-03-08 Mcafee, Llc Secure disk access control
US9894079B2 (en) 2012-10-19 2018-02-13 Mcafee, Llc Data loss prevention for mobile computing devices
US9536057B2 (en) 2012-10-19 2017-01-03 Mcafee, Inc. Premises aware security
US9571507B2 (en) 2012-10-21 2017-02-14 Mcafee, Inc. Providing a virtual security appliance architecture to a virtual cloud infrastructure
US11025647B2 (en) 2012-10-21 2021-06-01 Mcafee, Llc Providing a virtual security appliance architecture to a virtual cloud infrastructure
US9161258B2 (en) 2012-10-24 2015-10-13 Seven Networks, Llc Optimized and selective management of policy deployment to mobile clients in a congested network to prevent further aggravation of network congestion
US11875342B2 (en) 2012-12-18 2024-01-16 Mcafee, Llc Security broker
US11483334B2 (en) 2012-12-18 2022-10-25 Mcafee, Llc Automated asset criticality assessment
US9741032B2 (en) 2012-12-18 2017-08-22 Mcafee, Inc. Security broker
US10735454B2 (en) 2012-12-18 2020-08-04 Mcafee, Llc Automated asset criticality assessment
US10320830B2 (en) 2012-12-18 2019-06-11 Mcafee, Llc Automated asset criticality assessment
US11030617B2 (en) 2012-12-18 2021-06-08 Mcafee, Llc Security broker
US9954883B2 (en) 2012-12-18 2018-04-24 Mcafee, Inc. Automated asset criticality assessment
US9323935B2 (en) 2012-12-18 2016-04-26 Mcafee, Inc. User device security profile
US9307493B2 (en) 2012-12-20 2016-04-05 Seven Networks, Llc Systems and methods for application management of mobile device radio state promotion and demotion
US9015793B2 (en) 2012-12-21 2015-04-21 Mcafee, Inc. Hardware management interface
US8955075B2 (en) 2012-12-23 2015-02-10 Mcafee Inc Hardware-based device authentication
US8850543B2 (en) 2012-12-23 2014-09-30 Mcafee, Inc. Hardware-based device authentication
US9419953B2 (en) 2012-12-23 2016-08-16 Mcafee, Inc. Trusted container
US10432616B2 (en) 2012-12-23 2019-10-01 Mcafee, Llc Hardware-based device authentication
US9294478B2 (en) 2012-12-23 2016-03-22 Mcafee, Inc. Hardware-based device authentication
US9928360B2 (en) 2012-12-23 2018-03-27 Mcafee, Llc Hardware-based device authentication
US10757094B2 (en) 2012-12-23 2020-08-25 Mcafee, Llc Trusted container
US11245687B2 (en) 2012-12-23 2022-02-08 Mcafee, Llc Hardware-based device authentication
US10083290B2 (en) 2012-12-23 2018-09-25 Mcafee, Llc Hardware-based device authentication
US10333926B2 (en) 2012-12-23 2019-06-25 Mcafee, Llc Trusted container
US9351163B2 (en) 2012-12-26 2016-05-24 Mcafee, Inc. Automatic sanitization of data on a mobile device in a network environment
US10171611B2 (en) 2012-12-27 2019-01-01 Mcafee, Llc Herd based scan avoidance system in a network environment
US8973146B2 (en) 2012-12-27 2015-03-03 Mcafee, Inc. Herd based scan avoidance system in a network environment
US10140451B2 (en) 2013-01-16 2018-11-27 McAFEE, LLC. Detection of malicious scripting language code in a network environment
US9241314B2 (en) 2013-01-23 2016-01-19 Seven Networks, Llc Mobile device with application or context aware fast dormancy
US9560014B2 (en) 2013-01-23 2017-01-31 Mcafee, Inc. System and method for an endpoint hardware assisted network firewall in a security environment
US10103892B2 (en) 2013-01-23 2018-10-16 Mcafee, Llc System and method for an endpoint hardware assisted network firewall in a security environment
US9271238B2 (en) 2013-01-23 2016-02-23 Seven Networks, Llc Application or context aware fast dormancy
US8874761B2 (en) 2013-01-25 2014-10-28 Seven Networks, Inc. Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols
US8750123B1 (en) 2013-03-11 2014-06-10 Seven Networks, Inc. Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network
US9667648B2 (en) 2013-03-15 2017-05-30 Mcafee, Inc. Remote malware remediation
US10205744B2 (en) 2013-03-15 2019-02-12 Mcafee, Llc Remote malware remediation
US10834124B2 (en) 2013-03-15 2020-11-10 Mcafee, Llc Remote malware remediation
US9838434B2 (en) 2013-03-15 2017-12-05 Mcafee, Llc Creating and managing a network security tag
US9197660B2 (en) 2013-03-15 2015-11-24 Mcafee, Inc. Generic privilege escalation prevention
US9231976B2 (en) 2013-03-15 2016-01-05 Mcafee, Inc. Creating and managing a network security tag
US9990490B2 (en) 2013-03-15 2018-06-05 Mcafee, Llc Generic privilege escalation prevention
US9311480B2 (en) 2013-03-15 2016-04-12 Mcafee, Inc. Server-assisted anti-malware client
US9143519B2 (en) 2013-03-15 2015-09-22 Mcafee, Inc. Remote malware remediation
US9614865B2 (en) 2013-03-15 2017-04-04 Mcafee, Inc. Server-assisted anti-malware client
US9065765B2 (en) 2013-07-22 2015-06-23 Seven Networks, Inc. Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network
CN105745886A (en) * 2013-09-23 2016-07-06 迈克菲股份有限公司 Providing a fast path between two entities
US20160205071A1 (en) * 2013-09-23 2016-07-14 Mcafee, Inc. Providing a fast path between two entities
US11356413B2 (en) * 2013-09-23 2022-06-07 Mcafee, Llc Providing a fast path between two entities
US10587576B2 (en) * 2013-09-23 2020-03-10 Mcafee, Llc Providing a fast path between two entities
US10554624B2 (en) 2013-09-25 2020-02-04 Mcafee, Llc Proxy authentication for single sign-on
US10678908B2 (en) 2013-09-27 2020-06-09 Mcafee, Llc Trusted execution of an executable object on a local device
US11874921B2 (en) * 2013-09-27 2024-01-16 Mcafee, Llc Digital protection that travels with data
US10305929B2 (en) 2013-09-27 2019-05-28 Mcafee, Llc Managed software remediation
US9936018B2 (en) 2013-09-27 2018-04-03 Mcafee, Llc Task-context architecture for efficient data sharing
US20220269783A1 (en) * 2013-09-27 2022-08-25 Mcafee, Llc Digital protection that travels with data
US10417417B2 (en) 2013-09-27 2019-09-17 Mcafee, Llc Digital protection that travels with data
US11347848B2 (en) * 2013-09-27 2022-05-31 Mcafee, Llc Digital protection that travels with data
US11907362B2 (en) 2013-09-27 2024-02-20 MAfee, LLC Trusted execution of an executable object on a local device
US10171594B2 (en) 2013-09-28 2019-01-01 Mcafee, Llc Service-oriented architecture
US11076003B2 (en) 2013-09-28 2021-07-27 Mcafee, Llc Service-oriented architecture
US10819804B2 (en) 2013-09-28 2020-10-27 Mcafee, Llc Efficient request-response routing over a data exchange layer
US11902388B2 (en) 2013-09-28 2024-02-13 Musarubra Us Llc Service-oriented architecture
US10447714B2 (en) * 2013-09-28 2019-10-15 Mcafee, Llc Context-aware network on a data exchange layer
US11418605B2 (en) 2013-09-28 2022-08-16 Musarubra Us Llc Efficient request-response routing over a data exchange layer
US20160219063A1 (en) * 2013-09-28 2016-07-28 Mcafee, Inc. Context-aware network on a data exchange layer
US10135845B2 (en) * 2013-09-28 2018-11-20 Mcafee, Llc Context-aware network on a data exchange layer
US10142373B2 (en) * 2013-09-28 2018-11-27 Mcafee, Llc Security-connected framework
US10205798B2 (en) 2013-09-28 2019-02-12 Mcafee, Llc Merging multiple system trees over a data exchange layer
US11005895B2 (en) 2013-09-28 2021-05-11 Mcafee, Llc Location services on a data exchange layer
US10715556B2 (en) 2013-09-28 2020-07-14 Mcafee, Llc Real-time policy distribution
US20160205142A1 (en) * 2013-09-28 2016-07-14 Mcafee, Inc. Security-connected framework
US11665205B2 (en) 2013-09-28 2023-05-30 Musarubra Us Llc Location services on a data exchange layer
US10148695B2 (en) 2013-09-28 2018-12-04 Mcafee, Llc Real-time policy distribution
US10609088B2 (en) 2013-09-28 2020-03-31 Mcafee, Llc Location services on a data exchange layer
US10484398B2 (en) 2013-09-29 2019-11-19 Mcafee, Llc Threat intelligence on a data exchange layer
US10749843B2 (en) 2013-09-29 2020-08-18 Mcafee, Llc One-click reputation adjustment
US10237303B2 (en) 2013-09-29 2019-03-19 Mcafee, Llc Prevalence-based reputations
US10904269B2 (en) 2013-09-29 2021-01-26 Mcafee, Llc Threat intelligence on a data exchange layer
US9591028B2 (en) 2013-09-30 2017-03-07 Mcafee, Inc. Visualization and analysis of complex security information
US9578052B2 (en) 2013-10-24 2017-02-21 Mcafee, Inc. Agent assisted malicious application blocking in a network environment
US11171984B2 (en) 2013-10-24 2021-11-09 Mcafee, Llc Agent assisted malicious application blocking in a network environment
US10645115B2 (en) 2013-10-24 2020-05-05 Mcafee, Llc Agent assisted malicious application blocking in a network environment
US10205743B2 (en) 2013-10-24 2019-02-12 Mcafee, Llc Agent assisted malicious application blocking in a network environment
US10694029B1 (en) 2013-11-07 2020-06-23 Rightquestion, Llc Validating automatic number identification data
US11856132B2 (en) 2013-11-07 2023-12-26 Rightquestion, Llc Validating automatic number identification data
US10674009B1 (en) 2013-11-07 2020-06-02 Rightquestion, Llc Validating automatic number identification data
US11005989B1 (en) 2013-11-07 2021-05-11 Rightquestion, Llc Validating automatic number identification data
US10904218B2 (en) 2013-11-25 2021-01-26 Mcafee, Llc Secure proxy to protect private data
US10044739B2 (en) 2013-12-27 2018-08-07 McAFEE, LLC. Frequency-based reputation
US10891155B2 (en) 2014-01-03 2021-01-12 Mcafee, Llc Wearable device task offloading to conserve processing resources
US11861396B2 (en) 2014-01-03 2024-01-02 Mcafee, Llc Mechanisms for conserving resources of wearable devices
US10206100B2 (en) 2014-01-03 2019-02-12 Mcafee, Llc Secure context sharing for priority calling and various personal safety mechanisms
US11438286B2 (en) 2014-03-21 2022-09-06 Litera Corporation Systems and methods for email attachments management including changing attributes
US9756002B2 (en) 2014-03-21 2017-09-05 Litera Technologies, LLC Systems and methods for email attachments management
US9607086B2 (en) 2014-03-27 2017-03-28 Mcafee, Inc. Providing prevalence information using query data
US10482247B2 (en) 2014-06-27 2019-11-19 Mcafee, Llc Mitigation of malware
US9465939B2 (en) 2014-06-27 2016-10-11 Mcafee, Inc. Mitigation of malware
US9462471B2 (en) 2014-06-27 2016-10-04 Mcafee, Inc. Identification of call participants
US10204223B2 (en) 2014-06-27 2019-02-12 Mcafee, Llc System and method to mitigate malicious calls
US10275594B2 (en) 2014-06-27 2019-04-30 Mcafee, Llc Mitigation of malware
US9767283B2 (en) 2014-06-27 2017-09-19 Mcafee, Inc. System and method to mitigate malicious calls
US20150381533A1 (en) * 2014-06-29 2015-12-31 Avaya Inc. System and Method for Email Management Through Detection and Analysis of Dynamically Variable Behavior and Activity Patterns
US9961102B2 (en) 2014-07-16 2018-05-01 Mcafee, Llc Detection of stack pivoting
US9881072B2 (en) 2014-08-14 2018-01-30 McAFEE, LLC. Dynamic feature set management
US10445505B2 (en) 2014-09-22 2019-10-15 Mcafee, Llc Process vulnerability assessment
US9955001B2 (en) 2014-09-23 2018-04-24 Mcafee, Llc Device lock while in motion
US10050993B2 (en) 2014-09-24 2018-08-14 Mcafee, Llc Non-invasive whitelisting
US11627145B2 (en) 2014-09-24 2023-04-11 Mcafee, Llc Determining a reputation of data using a data visa including information indicating a reputation
US10462156B2 (en) 2014-09-24 2019-10-29 Mcafee, Llc Determining a reputation of data using a data visa
US10176344B2 (en) 2014-09-25 2019-01-08 Mcafee, Llc Data verification using enclave attestation
US9876806B2 (en) 2014-09-25 2018-01-23 Mcafee, Llc Behavioral detection of malware agents
US9798895B2 (en) 2014-09-25 2017-10-24 Mcafee, Inc. Platform identity architecture with a temporary pseudonymous identity
US9609005B2 (en) 2014-09-25 2017-03-28 Mcafee, Inc. Cross-view malware detection
US9715597B2 (en) 2014-09-25 2017-07-25 Mcafee, Inc. Data verification using enclave attestation
US11397761B2 (en) 2014-09-26 2022-07-26 Mcafee, Llc Context-aware reputation of a place
US9817843B2 (en) 2014-09-26 2017-11-14 Mcafee, Inc. Notification of human safety reputation of a place based on historical events, profile data, and dynamic factors
US9870469B2 (en) 2014-09-26 2018-01-16 Mcafee, Inc. Mitigation of stack corruption exploits
US9886577B2 (en) 2014-09-26 2018-02-06 Mcafee, Llc Detection and mitigation of malicious invocation of sensitive code
US10366228B2 (en) 2014-09-26 2019-07-30 Mcafee, Llc Detection and mitigation of malicious invocation of sensitive code
US10075465B2 (en) 2014-10-09 2018-09-11 Bank Of America Corporation Exposure of an apparatus to a technical hazard
US11416606B2 (en) 2014-10-24 2022-08-16 Musarubra Us Llc Agent presence for self-healing
US9807118B2 (en) 2014-10-26 2017-10-31 Mcafee, Inc. Security orchestration framework
US10237254B2 (en) 2014-11-13 2019-03-19 Mcafee, Llc Conditional login promotion
US20160182429A1 (en) * 2014-12-18 2016-06-23 International Business Machines Corporation Policy-based delayed dispatch of e-mail messages
US20160182421A1 (en) * 2014-12-18 2016-06-23 International Business Machines Corporation Policy-based delayed dispatch of e-mail messages
US11328063B2 (en) 2014-12-23 2022-05-10 Mcafee, Llc Identification of malicious execution of a process
US9712545B2 (en) 2014-12-23 2017-07-18 Mcafee, Inc. Detection of a malicious peripheral
US10467409B2 (en) 2014-12-23 2019-11-05 Mcafee, Llc Identification of malicious execution of a process
US9665716B2 (en) 2014-12-23 2017-05-30 Mcafee, Inc. Discovery of malicious strings
US9769186B2 (en) 2014-12-23 2017-09-19 Mcafee, Inc. Determining a reputation through network characteristics
US10083295B2 (en) 2014-12-23 2018-09-25 Mcafee, Llc System and method to combine multiple reputations
US11870793B2 (en) 2014-12-23 2024-01-09 Mcafee, Llc Determining a reputation for a process
US9832207B2 (en) 2014-12-23 2017-11-28 Mcafee, Inc. Input verification
US9934380B2 (en) 2014-12-23 2018-04-03 Mcafee, Llc Execution profiling detection of malicious objects
US9948468B2 (en) * 2014-12-23 2018-04-17 Mcafee, Llc Digital heritage notary
US10834109B2 (en) 2014-12-23 2020-11-10 Mcafee, Llc Determining a reputation for a process
US11032266B2 (en) 2014-12-23 2021-06-08 Mcafee, Llc Determining the reputation of a digital certificate
US20160182240A1 (en) * 2014-12-23 2016-06-23 Mcafee, Inc. Digital heritage notary
US10929540B2 (en) 2014-12-26 2021-02-23 Mcafee, Llc Trusted updates
US10409989B2 (en) 2014-12-26 2019-09-10 Mcafee, Llc Trusted updates
US9525675B2 (en) 2014-12-26 2016-12-20 Mcafee, Inc. Encryption key retrieval
US11531759B2 (en) 2014-12-26 2022-12-20 Mcafee, Llc Trusted updates
US10021137B2 (en) 2014-12-27 2018-07-10 Mcafee, Llc Real-time mobile security posture
US9798559B2 (en) 2014-12-27 2017-10-24 Mcafee, Inc. Trusted binary translation
US9996690B2 (en) * 2014-12-27 2018-06-12 Mcafee, Llc Binary translation of a trusted binary with input tagging
US9762591B2 (en) 2014-12-27 2017-09-12 Mcafee, Inc. Message sender authenticity validation
US9679140B2 (en) 2014-12-27 2017-06-13 Mcafee, Inc. Outbreak pathology inference
US20160188873A1 (en) * 2014-12-27 2016-06-30 Ned M. Smith Binary translation of a trusted binary with input tagging
US10178132B2 (en) 2014-12-27 2019-01-08 Mcafee, Llc Real-time mobile security posture
US10339303B2 (en) 2015-01-22 2019-07-02 Mcafee, Llc Detection of malicious invocation of application program interface calls
US10127380B2 (en) 2015-02-26 2018-11-13 Mcafee, Llc System and method to mitigate malware
US9672357B2 (en) 2015-02-26 2017-06-06 Mcafee, Inc. System and method to mitigate malware
US10659479B2 (en) 2015-03-27 2020-05-19 Mcafee, Llc Determination of sensor usage
US10154017B2 (en) 2015-04-30 2018-12-11 Mcafee, Llc Device pairing in a local network
US10742621B2 (en) 2015-04-30 2020-08-11 Mcafee, Llc Device pairing in a local network
US10205712B2 (en) 2015-06-10 2019-02-12 Mcafee, Llc Sentinel appliance in an internet of things realm
US10599662B2 (en) 2015-06-26 2020-03-24 Mcafee, Llc Query engine for remote endpoint information retrieval
US11429625B2 (en) 2015-06-26 2022-08-30 Musarubra Us Llc Query engine for remote endpoint information retrieval
US9984230B2 (en) 2015-06-26 2018-05-29 Mcafee, Llc Profiling event based exploit detection
US10691476B2 (en) 2015-06-27 2020-06-23 Mcafee, Llc Protection of sensitive data
US10050980B2 (en) 2015-06-27 2018-08-14 Mcafee, Llc Enterprise reputations for uniform resource locators
US10834027B2 (en) 2015-06-27 2020-11-10 Mcafee, Llc Protection of sensitive chat data
US9723006B2 (en) 2015-06-27 2017-08-01 Mcafee, Inc. Temporary process deprivileging
US10579544B2 (en) 2015-06-27 2020-03-03 Mcafee, Llc Virtualized trusted storage
US10129291B2 (en) 2015-06-27 2018-11-13 Mcafee, Llc Anomaly detection to identify malware
US10083296B2 (en) 2015-06-27 2018-09-25 Mcafee, Llc Detection of malicious thread suspension
US10642976B2 (en) 2015-06-27 2020-05-05 Mcafee, Llc Malware detection using a digital certificate
US10162767B2 (en) 2015-06-27 2018-12-25 Mcafee, Llc Virtualized trusted storage
US11379583B2 (en) 2015-06-27 2022-07-05 Mcafee, Llc Malware detection using a digital certificate
US11171895B2 (en) 2015-06-27 2021-11-09 Mcafee, Llc Protection of sensitive chat data
US10803165B2 (en) 2015-06-27 2020-10-13 Mcafee, Llc Detection of shellcode
US9846774B2 (en) 2015-06-27 2017-12-19 Mcafee, Llc Simulation of an application
US11128626B2 (en) 2015-06-30 2021-09-21 Mcafee, Llc Security service for an unmanaged device
US10554662B2 (en) 2015-06-30 2020-02-04 Mcafee, Llc Security service for an unmanaged device
US11641355B2 (en) 2015-06-30 2023-05-02 Skyhigh Security Llc Security service for an unmanaged device
US10530720B2 (en) 2015-08-27 2020-01-07 Mcafee, Llc Contextual privacy engine for notifications
US10536408B2 (en) 2015-09-16 2020-01-14 Litéra Corporation Systems and methods for detecting, reporting and cleaning metadata from inbound attachments
US10148624B2 (en) 2015-09-25 2018-12-04 Mcafee, Llc Secure service matching
US10417579B2 (en) 2015-09-25 2019-09-17 Mcafee, Inc. Multi-label classification for overlapping classes
US9678687B2 (en) 2015-09-25 2017-06-13 Mcafee, Inc. User mode heap swapping
US10318746B2 (en) 2015-09-25 2019-06-11 Mcafee, Llc Provable traceability
US10826877B2 (en) 2015-09-25 2020-11-03 Mcafee, Llc Secure service matching
US9914460B2 (en) 2015-09-25 2018-03-13 Mcafee, Llc Contextual scoring of automobile drivers
US9870466B2 (en) 2015-09-26 2018-01-16 Mcafee, Inc. Hardware-enforced code paths
US10621977B2 (en) 2015-10-30 2020-04-14 Mcafee, Llc Trusted speech transcription
US10764314B2 (en) 2015-10-31 2020-09-01 Mcafee, Llc Implicit crowdsourcing for untracked correction or verification of categorization information
US11301564B2 (en) 2015-10-31 2022-04-12 Mcafee, Llc Decision forest compilation
US10091224B2 (en) 2015-10-31 2018-10-02 Mcafee, Llc Implicit crowdsourcing for untracked correction or verification of categorization information
US10296742B2 (en) 2015-10-31 2019-05-21 Mcafee, Llc Decision forest compilation
US10063419B2 (en) 2015-10-31 2018-08-28 Mcafee, Llc Establishing nodes for global routing manager
US10681119B2 (en) 2015-10-31 2020-06-09 Mcafee, Llc Establishing nodes for global routing manager
US9843550B2 (en) * 2015-11-29 2017-12-12 International Business Machines Corporation Processing messages in a data messaging system using constructed resource models
US10129125B2 (en) 2015-12-18 2018-11-13 Mcafee, Llc Identifying a source device in a software-defined network
US10909638B2 (en) 2015-12-21 2021-02-02 Mcafee, Llc Verified social media content
US10204384B2 (en) 2015-12-21 2019-02-12 Mcafee, Llc Data loss prevention of social media content
US10825111B2 (en) 2015-12-21 2020-11-03 Mcafee, Llc Verified social media content
US10044696B2 (en) 2015-12-22 2018-08-07 Mcafee, Llc Simplified sensor integrity
US10754703B2 (en) 2015-12-22 2020-08-25 Mcafee, Llc Trusted computing resource meter
US10193858B2 (en) 2015-12-22 2019-01-29 Mcafee, Llc Attestation device custody transfer protocol
US11831654B2 (en) 2015-12-22 2023-11-28 Mcafee, Llc Secure over-the-air updates
US9912528B2 (en) 2015-12-22 2018-03-06 Mcafee, Llc Security content over a management band
US9917775B2 (en) 2015-12-22 2018-03-13 Mcafee, Llc Intelligent devices in a software-defined network
US10691739B2 (en) 2015-12-22 2020-06-23 Mcafee, Llc Multi-label content recategorization
US10289570B2 (en) 2015-12-24 2019-05-14 Mcafee, Llc Detecting data corruption by control flow interceptions
US10802989B2 (en) 2015-12-24 2020-10-13 Mcafee, Llc Detecting data corruption by control flow interceptions
US10819780B2 (en) 2015-12-24 2020-10-27 Mcafee, Llc Protected data collection in a multi-node network
US10025930B2 (en) 2015-12-24 2018-07-17 Mcafee, Llc Hardware assisted branch transfer self-check mechanism
US10567170B2 (en) 2015-12-24 2020-02-18 Mcafee, Llc Hardware-generated dynamic identifier
US10210331B2 (en) 2015-12-24 2019-02-19 Mcafee, Llc Executing full logical paths for malware detection
US9898605B2 (en) 2015-12-24 2018-02-20 Mcafee, Llc Monitoring executed script for zero-day attack of malware
US10887266B2 (en) 2016-04-13 2021-01-05 Mcafee, Llc Personalization of delivery of notifications
US11489804B2 (en) 2016-04-13 2022-11-01 Mcafee, Llc Personalization of delivery of notifications
US10574672B2 (en) 2016-07-01 2020-02-25 Mcafee, Llc System and method to detect bypass of a sandbox application
US10805270B2 (en) * 2016-09-26 2020-10-13 Agari Data, Inc. Mitigating communication risk by verifying a sender of a message
US10992645B2 (en) 2016-09-26 2021-04-27 Agari Data, Inc. Mitigating communication risk by detecting similarity to a trusted message contact
US11595354B2 (en) 2016-09-26 2023-02-28 Agari Data, Inc. Mitigating communication risk by detecting similarity to a trusted message contact
US20180091478A1 (en) * 2016-09-26 2018-03-29 Agari Data, Inc. Mitigating communication risk by verifying a sender of a message
US10880322B1 (en) 2016-09-26 2020-12-29 Agari Data, Inc. Automated tracking of interaction with a resource of a message
US10604251B2 (en) 2016-09-29 2020-03-31 Mcafee, Llc Apparatus and methods for unmanned aerial vehicle servicing of modular device assembly
US11049039B2 (en) 2016-09-30 2021-06-29 Mcafee, Llc Static and dynamic device profile reputation using cloud-based machine learning
US11722513B2 (en) 2016-11-30 2023-08-08 Agari Data, Inc. Using a measure of influence of sender in determining a security risk associated with an electronic message
US10715543B2 (en) 2016-11-30 2020-07-14 Agari Data, Inc. Detecting computer security risk based on previously observed communications
US11044267B2 (en) 2016-11-30 2021-06-22 Agari Data, Inc. Using a measure of influence of sender in determining a security risk associated with an electronic message
US20180262457A1 (en) * 2017-03-09 2018-09-13 Microsoft Technology Licensing, Llc Self-debugging of electronic message bugs
US11019076B1 (en) 2017-04-26 2021-05-25 Agari Data, Inc. Message security assessment using sender identity profiles
US11722497B2 (en) 2017-04-26 2023-08-08 Agari Data, Inc. Message security assessment using sender identity profiles
US10805314B2 (en) 2017-05-19 2020-10-13 Agari Data, Inc. Using message context to evaluate security of requested data
US11757914B1 (en) 2017-06-07 2023-09-12 Agari Data, Inc. Automated responsive message to determine a security risk of a message sender
US11102244B1 (en) 2017-06-07 2021-08-24 Agari Data, Inc. Automated intelligence gathering
CN107450495A (en) * 2017-08-25 2017-12-08 艾普工华科技(武汉)有限公司 A kind of flexibility based on message rule engine is in artefact management business model system
US11936604B2 (en) 2017-10-17 2024-03-19 Agari Data, Inc. Multi-level security analysis and intermediate delivery of an electronic message
US20200374112A1 (en) * 2017-12-01 2020-11-26 Huawei Technologies Co., Ltd. Secure Provisioning of Data to Client Device
US20190199672A1 (en) * 2017-12-21 2019-06-27 Knowmail S.A.L LTD. Digital messaging prioritization within an organization
US10791118B2 (en) 2018-03-29 2020-09-29 Mcafee, Llc Authenticating network services provided by a network
US11044077B2 (en) 2018-09-25 2021-06-22 Mcafee, Llc Modifiable client-side encrypted data in the cloud
US10795994B2 (en) 2018-09-26 2020-10-06 Mcafee, Llc Detecting ransomware
US11392695B2 (en) 2018-09-26 2022-07-19 Mcafee, Llc Detecting ransomware
US10838780B2 (en) 2018-12-10 2020-11-17 Mcafee, Llc Portable hosted content
US11100225B2 (en) 2018-12-28 2021-08-24 Mcafee, Llc Scanning of encrypted zip files
US11283763B2 (en) 2018-12-28 2022-03-22 Mcafee, Llc On-device dynamic safe browsing
US11263325B2 (en) 2019-01-31 2022-03-01 Mcafee, Llc System and method for application exploration
CN112448882A (en) * 2019-09-05 2021-03-05 北京国双科技有限公司 Mail service method and device for enterprise-level platform
US11936738B2 (en) 2020-12-14 2024-03-19 Mcafee, Llc System, method, and computer program product for managing a connection between a device and a network

Similar Documents

Publication Publication Date Title
US6073142A (en) Automated post office based rule analysis of e-mail messages and other data objects for controlled distribution in network environments
US5978566A (en) Client side deferred actions within multiple MAPI profiles
US6105056A (en) Object oriented mail server framework mechanism
US7962708B2 (en) Resolving retention policy conflicts
US8600948B2 (en) Avoiding duplicative storage of managed content
US6021427A (en) Method and system for preventing routing maelstrom loops of automatically routed electronic mail
US5917489A (en) System and method for creating, editing, and distributing rules for processing electronic messages
US5813008A (en) Single instance storage of information
US6725228B1 (en) System for managing and organizing stored electronic messages
US5913032A (en) System and methods for automatically distributing a particular shared data object through electronic mail
US6678705B1 (en) System for archiving electronic documents using messaging groupware
US7970834B2 (en) Method and program product for tracking a file attachment in an e-mail
US7328251B2 (en) Thread based email
US6442546B1 (en) Messaging system with application-defined states
US7512662B2 (en) System and method for user registry management of messages
US20070156783A1 (en) Message life-cycle management policies and administration
US20040054733A1 (en) E-mail management system and method
US20060168046A1 (en) Managing periodic electronic messages
CN103201704B (en) Data for e-mail system are supervised
US20070150551A1 (en) Automatic sharing of online resources in a multi-user computer system
JPH09325939A (en) Groupware system provided with agent function
US20020059380A1 (en) Event-based messaging
EP1632064A1 (en) Messaging system
US20060080393A1 (en) Method for using e-mail documents to create and update address lists
US6151623A (en) Agent activity report via object embedding

Legal Events

Date Code Title Description
AS Assignment

Owner name: PARK CITY GROUP, UTAH

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GEIGER, FRED J.;WOOD, WILLIAM K.;TANDON, SONJAYA T.;REEL/FRAME:008672/0456;SIGNING DATES FROM 19970617 TO 19970619

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

AS Assignment

Owner name: PARK CITY GROUP, INC., EDWARD CLISSOLD, UTAH

Free format text: RELEASE OF SECURITY AGREEMENT;ASSIGNOR:TRIPLE NET INVESTMENTS, LTD AS SUCCESSOR TO WHALE INVESTMENTS, LTD.;REEL/FRAME:016958/0202

Effective date: 20050822

FEPP Fee payment procedure

Free format text: PAT HOLDER NO LONGER CLAIMS SMALL ENTITY STATUS, ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: STOL); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

REFU Refund

Free format text: REFUND - PAYMENT OF MAINTENANCE FEE UNDER 1.28(C) (ORIGINAL EVENT CODE: R1559); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Free format text: REFUND - PAYMENT OF MAINTENANCE FEE, 8TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: R2552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FPAY Fee payment

Year of fee payment: 8

AS Assignment

Owner name: PAIT CAPITAL FACILITY LLC, DELAWARE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PARK CITY GROUP, INC.;REEL/FRAME:020261/0862

Effective date: 20070928

AS Assignment

Owner name: PARK CITY GROUP, INC., UTAH

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE NATURE OF CONVEYANCE AS RELEASE OF SECURITY PREVIOUSLY RECORDED ON REEL 016958 FRAME 0202. ASSIGNOR(S) HEREBY CONFIRMS THE NATURE OF CONVEYANCE SHOULD BE ASSIGNMENT OF SECURITY AGREEMENT;ASSIGNOR:TRIPLE NET INVESTMENTS, LTD.;REEL/FRAME:025445/0907

Effective date: 20050822

Owner name: INTELLECTUAL VENTURES I LLC, DELAWARE

Free format text: MERGER;ASSIGNOR:PAIT CAPITAL FACILITY LLC;REEL/FRAME:025467/0097

Effective date: 20101207

Owner name: PARK CITY GROUP, INC., UTAH

Free format text: RELEASE AND REASSIGNMENT;ASSIGNOR:TRIPLE NET INVESTMENTS, LTD.;REEL/FRAME:025445/0902

Effective date: 20050825

AS Assignment

Owner name: TRIPLE NET INVESTMENTS, LTD., TURKS AND CAICOS ISL

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE RMONEOUS RECORDATION OF ASSIGNMENT OF SECURITY AGREEMENT DOCUMENT PREVIOUSLY RECORDED ON REEL 025445, FRAME 0907 ASSIGNOR(S) HEREBY CONFIMS THE ASSIGNMENT OF SECURITY AGREEMENT;ASSIGNOR:WHALE INVESTMENTS, LTD.;REEL/FRAME:026413/0356

Effective date: 20040702

FPAY Fee payment

Year of fee payment: 12

AS Assignment

Owner name: HANGER SOLUTIONS, LLC, GEORGIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTELLECTUAL VENTURES ASSETS 161 LLC;REEL/FRAME:052159/0509

Effective date: 20191206

AS Assignment

Owner name: INTELLECTUAL VENTURES ASSETS 161 LLC, DELAWARE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTELLECTUAL VENTURES I LLC;REEL/FRAME:051945/0001

Effective date: 20191126

AS Assignment

Owner name: TUMBLEWEED HOLDINGS LLC, NEW JERSEY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HANGER SOLUTIONS, LLC;REEL/FRAME:059620/0066

Effective date: 20210303